BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
identification
Google identification

Tag #identification

1308 papers:

EDMEDM-2019-AlexandronVP #detection #online #towards
Towards a General Purpose Anomaly Detection Method to Identify Cheaters in Massive Open Online Courses (GA, JARV, DEP).
EDMEDM-2019-HarrakBLB #automation #learning #self
Automatic identification of questions in MOOC forums and association with self-regulated learning (FH, FB, VL, RB).
EDMEDM-2019-HuangBS #collaboration #machine learning #using
Identifying Collaborative Learning States Using Unsupervised Machine Learning on Eye-Tracking, Physiological and Motion Sensor Data (KH, TB, BS).
EDMEDM-2019-JayaramanGG #machine learning #student #using
Supporting Minority Student Success by using Machine Learning to Identify At-Risk Students (JDJ, SG, JG).
EDMEDM-2019-JuZABC #learning
Identifying Critical Pedagogical Decisions through Adversarial Deep Reinforcement Learning (SJ, GZ, HA, TB, MC).
EDMEDM-2019-OliveiraM #bias #performance #student
Identifying bias and underlying knowledge structures in Brazilian National Exam of Students Performance (MSO, CEM).
ICSMEICSME-2019-Alsuhaibani #identifier #markov #modelling
Applying Markov Models to Identify Grammatical Patterns of Function Identifiers (RSA), pp. 610–614.
ICSMEICSME-2019-PalacioMMBPS #learning #network #using
Learning to Identify Security-Related Issues Using Convolutional Neural Networks (DNP, DM, KM, CBC, DP, CS), pp. 140–144.
ICSMEICSME-2019-YangW #comprehension
Identifying the Within-Statement Changes to Facilitate Change Understanding (CY, JW), pp. 191–201.
ICSMEICSME-2019-ZaidAM #automation
Automated Identification of Over-Privileged SmartThings Apps (AAZ, MHA, AM), pp. 247–251.
MSRMSR-2019-DietrichLD #case study #stack overflow
Man vs machine: a study into language identification of stack overflow code snippets (JD0, MLR, ED), pp. 205–209.
MSRMSR-2019-MontandonSV #framework #git #library
Identifying experts in software libraries and frameworks among GitHub users (JEM, LLS, MTV), pp. 276–287.
SANERSANER-2019-ChochlovEBIS #case study #industrial
Identifying Feature Clones: An Industrial Case Study (MC, ME, JB, DI, MS), pp. 544–548.
SANERSANER-2019-RenZKW #development
Identifying Redundancies in Fork-based Development (LR, SZ, CK, AW), pp. 230–241.
FSCDFSCD-2019-Diaz-CaroD #logic #normalisation #proving
Proof Normalisation in a Logic Identifying Isomorphic Propositions (ADC, GD), p. 23.
AIIDEAIIDE-2019-DemediukYDWB #analysis
Role Identification for Accurate Analysis in Dota 2 (SD, PY, AD, JAW, FB), pp. 130–138.
CoGCoG-2019-FowlerNC #case study #game studies
Identifying Cognitive Load in a Computer Game: An exploratory study of young children (AF, KN, AC), pp. 1–6.
DiGRADiGRA-2019-RegnathE #game studies #social
Me, myself and others: Connecting player identification to gaming social capital (FR, AE).
FDGFDG-2019-BoweyFM
Red or blue pill: fostering identification and transportation through dialogue choices in RPGs (JTB, MAF, RLM), p. 11.
CoGVS-Games-2019-BakalosRDDPV #network #using
Choreographic Pose Identification using Convolutional Neural Networks (NB, IR, ND, AD, EP, AV), pp. 1–7.
CIKMCIKM-2019-AliARR #named
EPA: Exoneration and Prominence based Age for Infection Source Identification (SSA, TA, AR, SAMR), pp. 891–900.
CIKMCIKM-2019-FanZDCSL #approach #graph #learning #network #novel
Learning to Identify High Betweenness Centrality Nodes from Scratch: A Novel Graph Neural Network Approach (CF, LZ, YD, MC, YS, ZL), pp. 559–568.
CIKMCIKM-2019-LiECL #clustering #mobile #multi #network
Multi-scale Trajectory Clustering to Identify Corridors in Mobile Networks (LL, SME, CAC, CL), pp. 2253–2256.
CIKMCIKM-2019-LiuLLZS #classification
Sexual Harassment Story Classification and Key Information Identification (YL, QL, XL, QZ, LS), pp. 2385–2388.
CIKMCIKM-2019-SinhaMSMS0 #approach #multi #twitter
#suicidal - A Multipronged Approach to Identify and Explore Suicidal Ideation in Twitter (PPS, RM, RS, DM, RRS, HL0), pp. 941–950.
CIKMCIKM-2019-SrinivasanRSG
Identifying Facet Mismatches In Search Via Micrographs (SS, NSR, KS, LG), pp. 1663–1672.
CIKMCIKM-2019-ZhangFYZS #framework #network
Key Player Identification in Underground Forums over Attributed Heterogeneous Information Network Embedding Framework (YZ, YF, YY, LZ, CS), pp. 549–558.
CIKMCIKM-2019-ZhengSKY #clique #set
Author Set Identification via Quasi-Clique Discovery (YZ, CS, XK, YY), pp. 771–780.
ECIRECIR-p1-2019-TrienesB #community
Identifying Unclear Questions in Community Question Answering Websites (JT, KB), pp. 276–289.
ECIRECIR-p2-2019-ElsayedNBHSMA #automation #exclamation #verification
CheckThat! at CLEF 2019: Automatic Identification and Verification of Claims (TE, PN, ABC, MH, RS, GDSM, PA), pp. 309–315.
ECIRECIR-p2-2019-JolyGBKPSGBVPSS #challenge #predict
LifeCLEF 2019: Biodiversity Identification and Prediction Challenges (AJ, HG, CB, SK, MP, MS, HG, PB, WPV, RP, JS, FRS, HM), pp. 275–282.
ECIRECIR-p2-2019-PritsosRS #distance #nearest neighbour #using #web
Open-Set Web Genre Identification Using Distributional Features and Nearest Neighbors Distance Ratio (DAP, AR0, ES), pp. 3–11.
ICMLICML-2019-ChaudhuriK #multi #probability
PAC Identification of Many Good Arms in Stochastic Multi-Armed Bandits (ARC, SK), pp. 991–1000.
ICMLICML-2019-JaberZB #equivalence #markov
Causal Identification under Markov Equivalence: Completeness Results (AJ, JZ, EB), pp. 2981–2989.
ICMLICML-2019-SarkarR #finite #linear
Near optimal finite time identification of arbitrary linear dynamical systems (TS, AR), pp. 5610–5618.
KDDKDD-2019-ChakrabortyF #framework #robust
A Robust Framework for Accelerated Outcome-driven Risk Factor Identification from EHR (PC, FF), pp. 1800–1808.
KDDKDD-2019-HanYZSLZ0K #graph #matrix #named #network
GCN-MF: Disease-Gene Association Identification By Graph Convolutional Networks and Matrix Factorization (PH, PY, PZ, SS, YL0, JZ, XG0, PK), pp. 705–713.
KDDKDD-2019-Ning00LR
Spatio-temporal Event Forecasting and Precursor Identification (YN, LZ0, FC0, CTL, HR), pp. 3237–3238.
KDDKDD-2019-SchulzeMRLB #using
Context by Proxy: Identifying Contextual Anomalies Using an Output Proxy (JPS, AM, ER, HAL, KB), pp. 2059–2068.
KDDKDD-2019-Venkataraman0 #towards
Towards Identifying Impacted Users in Cellular Services (SV, JW0), pp. 3029–3039.
KDDKDD-2019-YinH #analysis #estimation #testing
The Identification and Estimation of Direct and Indirect Effects in A/B Tests through Causal Mediation Analysis (XY, LH), pp. 2989–2999.
ASEASE-2019-NamHMMV #api #mining #named #problem #usability
MARBLE: Mining for Boilerplate Code to Identify API Usability Problems (DN, AH, AM, BAM, BV), pp. 615–627.
ASEASE-2019-ReicheltKH #named #performance
PeASS: A Tool for Identifying Performance Changes at Code Level (DGR, SK, WH), pp. 1146–1149.
ASEASE-2019-Zhang #approach #injection #machine learning #sql
A Machine Learning Based Approach to Identify SQL Injection Vulnerabilities (KZ), pp. 1286–1288.
ESEC-FSEESEC-FSE-2019-Cetin #developer #graph #traceability #using
Identifying the most valuable developers using artifact traceability graphs (HAC), pp. 1196–1198.
ESEC-FSEESEC-FSE-2019-FucciMM #api #documentation #machine learning #on the #using
On using machine learning to identify knowledge in API reference documentation (DF, AM, WM), pp. 109–119.
ICSE-2019-Du0LGZLJ #assessment #metric #named
Leopard: identifying vulnerable code for vulnerability assessment through program metrics (XD, BC0, YL, JG, YZ, YL0, YJ0), pp. 60–71.
ICSE-2019-HeCHWPY #fault #locality
A system identification based Oracle for control-CPS software fault localization (ZH, YC, EH, QW, YP0, HY), pp. 116–127.
ICSE-2019-XiaoWCWG #android #automation #classification #named #user interface
IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps (XX, XW, ZC, HW, PG), pp. 257–268.
CASECASE-2019-DuHD #physics #using
Model Identification and Physical Exercise Control using Nonlinear Heart Rate Model and Particle Filter (DD, ZH, YD), pp. 405–410.
CASECASE-2019-MatsuokaNT #approach #machine learning #problem #scheduling
Machine Learning Approach for Identification of Objective Function in Production Scheduling Problems (YM, TN, KT), pp. 679–684.
CASECASE-2019-Pinitnanthakorn #parametricity
Parameters Identification of a Five-Axis Machine Tool by Haar Wavelet (AP, SLC), pp. 271–274.
FASEFASE-2019-PonzioBPAF #api #automation
Automatically Identifying Sufficient Object Builders from Module APIs (PP, VSB, MP, NA, MFF), pp. 427–444.
ECSAECSA-2018-MartiniFBR #architecture #case study #scalability #smell
Identifying and Prioritizing Architectural Debt Through Architectural Smells: A Case Study in a Large Software Company (AM, FAF, AB, RR), pp. 320–335.
EDMEDM-2018-Andrews-ToddFSR #collaboration #online #problem
Identifying Profiles of Collaborative Problem Solvers in an Online Electronics Environment (JAT, CF, JS, AR).
EDMEDM-2018-LeeCN #framework #online #platform #video
Identifying User Engagement Patterns in an Online Video Discussion Platform (SYL, HSC, GN).
ICPCICPC-2018-BlasiG #clone detection #named
Replicomment: identifying clones in code comments (AB, AG), pp. 320–323.
ICPCICPC-2018-DoiHASK #automation #on the #question
On the naturalness of auto-generated code: can we identify auto-generated code automatically? (MD, YH, RA, KS, SK), pp. 340–343.
ICPCICPC-2018-LiuDAA #behaviour #component #execution #interface
Component interface identification and behavioral model discovery from software execution data (CL, BFvD, NA, WMPvdA), pp. 97–107.
ICPCICPC-2018-MessaoudiPBBS #approach #search-based
A search-based approach for accurate identification of log message formats (SM, AP, DB, LCB, RS), pp. 167–177.
ICPCICPC-2018-ShatnawiSSASS #api #component #dynamic analysis #object-oriented
Identifying software components from object-oriented APIs based on dynamic analysis (AS, HS, MAS, ZA, HAS, AS), pp. 189–199.
ICSMEICSME-2018-KlusenerMKW #abstraction
Reducing Code Duplication by Identifying Fresh Domain Abstractions (SK, AJM, JK, HvW), pp. 569–578.
MSRMSR-2018-ClaesMKF08 #automation #developer #open source #towards
Towards automatically identifying paid open source developers (MC, MM, MK, UF), pp. 437–441.
MSRMSR-2018-OttAHBL08 #approach #image #learning #source code #video
A deep learning approach to identifying source code in images and video (JO, AA, PH, AB, EL), pp. 376–386.
MSRMSR-2018-WilkieHKLNRPK #developer #ide #using
Who's this?: developer identification using IDE event data (JW, ZAH, AK, JL, GN, CR, MP, JK), pp. 90–93.
SANERSANER-2018-BurgerG #locality #named
FINALIsT2: Feature identification, localization, and tracing tool (AB, SG), pp. 532–537.
SANERSANER-2018-Salem #agile #mining #named
GoldRusher: A miner for rapid identification of hidden code (AS), pp. 517–521.
SCAMSCAM-2018-ChochlovEBIS
[Engineering Paper] Identifying Feature Clones in a Suite of Systems (MC, ME, JB, DI, MS), pp. 149–154.
CIKMCIKM-2018-Avigdor-Elgrabli #email #thread
More than Threads: Identifying Related Email Messages (NAE, RG, IGZ, AR), pp. 1711–1714.
CIKMCIKM-2018-FanLFSL #network #semantics
A Globalization-Semantic Matching Neural Network for Paraphrase Identification (MF, WL, YF, MS, PL0), pp. 2067–2075.
CIKMCIKM-2018-GaoJLD0 #network #social
User Identification with Spatio-Temporal Awareness across Social Networks (XG, WJ, YL0, YD, WD0), pp. 1831–1834.
CIKMCIKM-2018-HashemiWKZC18a #learning
Impact of Domain and User's Learning Phase on Task and Session Identification in Smart Speaker Intelligent Assistants (SHH, KW, AEK, IZ, PAC), pp. 1193–1202.
CIKMCIKM-2018-NobariAHN #comprehension #query
Query Understanding via Entity Attribute Identification (ADN, AA, FH, MN), pp. 1759–1762.
CIKMCIKM-2018-Yu0LYL #adaptation #network #recommendation #social
Adaptive Implicit Friends Identification over Heterogeneous Network for Social Recommendation (JY, MG0, JL, HY, HL0), pp. 357–366.
ICMLICML-2018-Katz-SamuelsS
Feasible Arm Identification (JKS, CS), pp. 2540–2548.
ICMLICML-2018-TaoBZ #dependence #linear
Best Arm Identification in Linear Bandits with Linear Dimension Dependency (CT, SAB, YZ0), pp. 4884–4893.
ICMLICML-2018-ZanetteB #bound #learning #problem
Problem Dependent Reinforcement Learning Bounds Which Can Identify Bandit Structure in MDPs (AZ, EB), pp. 5732–5740.
ICPRICPR-2018-AiZYH #algorithm #named
iCushion: A Pressure Map Algorithm for High Accuracy Human Identification (HA, LZ, ZY, HH), pp. 3483–3488.
ICPRICPR-2018-BoudraYB #metaprogramming #statistics
Plant identification from bark: A texture description based on Statistical Macro Binary Pattern (SB, IY, AB), pp. 1530–1535.
ICPRICPR-2018-CaoCHP #learning #metric
Region-specific Metric Learning for Person Re-identification (MC, CC0, XH, SP), pp. 794–799.
ICPRICPR-2018-DuSZ #contest #multi #network
Which Part is Better: Multi-Part Competition Network for person Re-Identification (PD, YS, YZ0), pp. 1634–1639.
ICPRICPR-2018-FerrariBB #dataset
Extended YouTube Faces: a Dataset for Heterogeneous Open-Set Face Identification (CF, SB, ADB), pp. 3408–3413.
ICPRICPR-2018-GuoLLL #adaptation #kernel #ranking
Density-Adaptive Kernel based Re-Ranking for Person Re-Identification (RPG, CGL, YL, JL), pp. 982–987.
ICPRICPR-2018-HanAMYU
Script Identification of Central Asia Based on Fused Texture Features (XkH, AA, HM, NY, KU), pp. 3675–3680.
ICPRICPR-2018-HuangXG #incremental #kernel #null
Incremental Kernel Null Foley-Sammon Transform for Person Re-identification (XH, JX, GG), pp. 1683–1688.
ICPRICPR-2018-JiangLSWZW #learning #similarity
Orientation-Guided Similarity Learning for Person Re-identification (NJ, JL, CS, YW, ZZ, WW), pp. 2056–2061.
ICPRICPR-2018-LicandroSRDDSLK
WGAN Latent Space Embeddings for Blast Identification in Childhood Acute Myeloid Leukaemia (RL, TS, MR, MD, MD, AS, GL, MK), pp. 3868–3873.
ICPRICPR-2018-LiPZ
Vehicle Re-Identification by Deep Feature Fusion Based on Joint Bayesian Criterion (SL, MP, LZ), pp. 2032–2037.
ICPRICPR-2018-LiuZWWZ #mining #multi
Identification of Hypertension by Mining Class Association Rules from Multi-dimensional Features (FL0, XZ, ZW, TW, YZ), pp. 3114–3119.
ICPRICPR-2018-LiZO #video
Identification of ASD Children based on Video Data (JL0, YZ, GO), pp. 367–372.
ICPRICPR-2018-MahboubiBC #approach #problem
A structural approach to Person Re-identification problem (AM, LB, DC), pp. 1616–1621.
ICPRICPR-2018-MukherjeeOP0
A Dravidian Language Identification System (HM, SMO, SP, KR0), pp. 2654–2657.
ICPRICPR-2018-NavyaSSRGPL #gender #multi
Multi-Gradient Directional Features for Gender Identification (BJN, GCS, PS, SR, DSG, UP0, TL), pp. 3657–3662.
ICPRICPR-2018-SoleymaniDKDN #abstraction #multimodal #network
Multi-Level Feature Abstraction from Convolutional Neural Networks for Multimodal Biometric Identification (SS, AD, HK, JMD, NMN), pp. 3469–3476.
ICPRICPR-2018-WangWLW0 #detection
Temporal Action Detection by Joint Identification-Verification (WW, YW, HL, SW, JC0), pp. 2026–2031.
ICPRICPR-2018-WuYSZ #learning #ranking
Joint Semi-supervised Learning and Re-ranking for Vehicle Re-identification (FW, SY, JSS, BZ), pp. 278–283.
ICPRICPR-2018-WuZZKZC #visual notation
Joint Identification-Verification Model for Visual Tracking (MW, YZ, YZ, TK, LZ, BC), pp. 1676–1682.
ICPRICPR-2018-XiangLHH
Person Re-identification Based on Feature Fusion and Triplet Loss Function (JX, RL, JH, WH), pp. 3477–3482.
ICPRICPR-2018-YanKM
Person Re-Identification with Vision and Language (FY0, JK, KM), pp. 2136–2141.
ICPRICPR-2018-ZhangCQZW
Person Re-Identification with Weighted Spatial-Temporal Features (DZ, RC, ZQ, WZ, QW), pp. 1426–1431.
ICPRICPR-2018-ZhangSOS #network #using
Person Re-identification Using Two-Stage Convolutional Neural Network (YZ, JS, DO, HTS), pp. 3341–3346.
ICPRICPR-2018-ZhuZLLZC #network
A Shortly and Densely Connected Convolutional Neural Network for Vehicle Re-identification (JZ, HZ, ZL, SL, LZ, CC), pp. 3285–3290.
KDDKDD-2018-CobbEMR #calculus #multi #process
Identifying Sources and Sinks in the Presence of Multiple Agents with Gaussian Process Vector Calculus (ADC, RE, AM, SJR), pp. 1254–1262.
KDDKDD-2018-KoptelovZBBC #named
PrePeP: A Tool for the Identification and Characterization of Pan Assay Interference Compounds (MK, AZ, PB, RB, BC), pp. 462–471.
KDDKDD-2018-LinKLZSXZQZ #big data #interactive #multi #named
BigIN4: Instant, Interactive Insight Identification for Multi-Dimensional Big Data (QL, WK, JGL, HZ0, KS, YX, ZZ, BQ, DZ), pp. 547–555.
KDDKDD-2018-SunTYWZ #modelling #predict
Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models (MS, FT, JY, FW, JZ), pp. 793–801.
OOPSLAOOPSLA-2018-VeduradaN #refactoring #subclass
Identifying refactoring opportunities for replacing type code with subclass and state (JV, VKN), p. 28.
PLATEAUPLATEAU-2018-ZengC #online #rust
Identifying Barriers to Adoption for Rust through Online Discourse (AZ, WC), p. 6.
ASEASE-2018-DegiovanniMRA #algorithm #search-based
A genetic algorithm for goal-conflict identification (RD, FM, GR, NA), pp. 520–531.
ASEASE-2018-DouHXZ0 #spreadsheet
Expandable group identification in spreadsheets (WD, SH, LX, DZ, JW0), pp. 498–508.
ASEASE-2018-YanDWW0Z #android #process
Characterizing and identifying misexposed activities in Android applications (JY, XD, PW, TW, JY0, JZ), pp. 691–701.
ESEC-FSEESEC-FSE-2018-HeLLZLZ #analysis #problem
Identifying impactful service system problems via log analysis (SH, QL, JGL, HZ0, MRL, DZ), pp. 60–70.
ICSE-2018-GaoZLK #analysis #online #overview
Online app review analysis for identifying emerging issues (CG, JZ, MRL, IK), pp. 48–58.
ICSE-2018-GarciaHM #android #detection #lightweight #obfuscation #product line
Lightweight, obfuscation-resilient detection and family identification of Android malware (JG, MH, SM), p. 497.
ICSE-2018-SousaOOBGLKMFOL #design #problem #source code
Identifying design problems in the source code: a grounded theory (LdSS, AO, WNO, SDJB, AG, JL, MK, RMdM, BF, RFO, CL, RBdP), pp. 921–931.
ICSE-2018-XiongLZ00 #correctness #program repair
Identifying patch correctness in test-based program repair (YX, XL, MZ, LZ0, GH0), pp. 789–799.
ICSE-2018-ZhouSLXWK
Identifying features in forks (SZ, SS, OL, YX, AW, CK), pp. 105–116.
CASECASE-2018-LuPC #automation #process
Automated Process State Identification for Metal Additive Manufacturing based on Power Data (ZL, TP, WC), pp. 1587–1592.
JCDLJCDL-2017-HassanAH #information management #using
Identifying Important Citations Using Contextual Information from Full Text (SUH, AA, PH), pp. 41–48.
JCDLJCDL-2017-YangHHOZKG #learning #library #using
Smart Library: Identifying Books on Library Shelves Using Supervised Deep Learning for Scene Text Reading (XY, DH, WH, AO, ZZ, DK, CLG), pp. 245–248.
EDMEDM-2017-DianaSK #education #logic
Teaching Informal Logical Fallacy Identification with a Cognitive Tutor (ND, JCS, KRK).
EDMEDM-2017-GitinabardLHB #community #student
Identifying student communities in blended courses (NG, CL, SH, TB).
EDMEDM-2017-HarrakBL #behaviour #student
Identifying relationships between students' questions type and their behavior (FH, FB, VL).
ICPCICPC-2017-MondalRS #debugging
Identifying code clones having high possibilities of containing bugs (MM, CKR, KAS), pp. 99–109.
ICPCICPC-2017-TangL #feature model #variability
Constructing feature model by identifying variability-aware modules (YT, HL), pp. 263–274.
SANERSANER-2017-RahmanR #concept #information retrieval #named #strict
STRICT: Information retrieval based search term identification for concept location (MMR0, CKR), pp. 79–90.
SANERSANER-2017-SilvaVB #dependence #javascript #legacy
Statically identifying class dependencies in legacy JavaScript systems: First results (LHS, MTV, AB), pp. 427–431.
SANERSANER-2017-Ujihara0II #named #refactoring
c-JRefRec: Change-based identification of Move Method refactoring opportunities (NU, AO0, TI, KI), pp. 482–486.
SEFMSEFM-2017-MasciZJC #analysis #requirements #safety #user interface
A Hazard Analysis Method for Systematic Identification of Safety Requirements for User Interface Software in Medical Devices (PM, YZ0, PLJ, JCC), pp. 284–299.
FDGFDG-2017-LeeR
Identifying and evaluating successful non-meta strategies in league of legends (CSL, IR), p. 6.
CoGVS-Games-2017-BacklundEMT #challenge #game studies #research
Developing games for non-leisure contexts: Identification of challenges and research gaps (PB, HE, BBM, MT), pp. 15–22.
CIKMCIKM-2017-FaniBD #community
Temporally Like-minded User Community Identification through Neural Embeddings (HF, EB, WD), pp. 577–586.
CIKMCIKM-2017-HuangZLLZH #graph #named
KIEM: A Knowledge Graph based Method to Identify Entity Morphs (LH, LZ, SL, FL, YZ, SH), pp. 2111–2114.
CIKMCIKM-2017-LinMZ #approach #modelling #multi #topic
An Enhanced Topic Modeling Approach to Multiple Stance Identification (JL, WM, YZ), pp. 2167–2170.
CIKMCIKM-2017-MandalGPG #automation #documentation
Automatic Catchphrase Identification from Legal Court Case Documents (AM, KG, AP0, SG0), pp. 2187–2190.
CIKMCIKM-2017-MumtazW #network
Identifying Top-K Influential Nodes in Networks (SM, XW), pp. 2219–2222.
CIKMCIKM-2017-ZhengSWH #generative #keyword #twitter
Semi-Supervised Event-related Tweet Identification with Dynamic Keyword Generation (XZ, AS, SW0, JH), pp. 1619–1628.
ECIRECIR-2017-JhamtaniRCN #enterprise
Leveraging Site Search Logs to Identify Missing Content on Enterprise Webpages (HJ, RSR, NC, EN), pp. 506–512.
ICMLICML-2017-ChenC0Z #adaptation #multi
Adaptive Multiple-Arm Identification (JC, XC0, QZ0, YZ0), pp. 722–730.
ICMLICML-2017-ChenKB #equation #linear #modelling #testing #using
Identification and Model Testing in Linear Structural Equation Models using Auxiliary Variables (BC, DK, EB), pp. 757–766.
ICMLICML-2017-MaystreG17a #named #network
ChoiceRank: Identifying Preferences from Node Traffic in Networks (LM, MG), pp. 2354–2362.
ICMLICML-2017-SenSDS #online
Identifying Best Interventions through Online Importance Sampling (RS, KS, AGD, SS), pp. 3057–3066.
ICMLICML-2017-ZhouLZ #equilibrium #game studies #nash #random
Identify the Nash Equilibrium in Static Games with Random Payoffs (YZ, JL, JZ0), pp. 4160–4169.
KDDKDD-2017-AlbertKG #network #scalability #using
Using Convolutional Networks and Satellite Imagery to Identify Patterns in Urban Environments at a Large Scale (AA, JK, MCG), pp. 1357–1366.
KDDKDD-2017-SoskaGRC #automation
Automatic Application Identification from Billions of Files (KS, CSG, KAR, NC), pp. 2021–2030.
ASEASE-2017-RupprechtC0BLB #c #c++ #data type #named
DSIbin: identifying dynamic data structures in C/C++ binaries (TR, XC0, DHW0, JHB, GL, HB), pp. 331–341.
ESEC-FSEESEC-FSE-2017-Kohli #android #named
DecisionDroid: a supervised learning-based system to identify cloned Android applications (AK), pp. 1059–1061.
ESEC-FSEESEC-FSE-2017-PastoreMM #behaviour #named
BDCI: behavioral driven conflict identification (FP, LM, DM), pp. 570–581.
ESEC-FSEESEC-FSE-2017-ZhouS #automation #commit #debugging #security
Automated identification of security issues from commit messages and bug reports (YZ, AS), pp. 914–919.
ASPLOSASPLOS-2017-ZhangSGCS #security #verification
Identifying Security Critical Properties for the Dynamic Verification of a Processor (RZ, NS, CG, AC, CS), pp. 541–554.
CASECASE-2017-ChenGL #analysis #markov #online #performance
Load identification based on Factorial Hidden Markov Model and online performance analysis (SC, FG, TL0), pp. 1249–1253.
ECSAECSA-2016-AbukwaikAR #analysis #api #automation #concept #constraints #documentation #towards
Towards Seamless Analysis of Software Interoperability: Automatic Identification of Conceptual Constraints in API Documentation (HA, MA, HDR), pp. 67–83.
WICSAWICSA-2016-TsigkanosK #formal method #on the #specification
On Formalizing and Identifying Patterns in Cloud Workload Specifications (CT, TK), pp. 262–267.
EDMEDM-2016-CraigHXFH #behaviour #learning #persistent #predict
Identifying relevant user behavior and predicting learning and persistence in an ITS-based afterschool program (SDC, XH, JX, YF, XH), pp. 581–582.
EDMEDM-2016-MoriC #behaviour #online #performance #student
Identifying Student Behaviors Early in the Term for Improving Online Course Performance (MM, PC), pp. 611–612.
EDMEDM-2016-WangC #online #student
A Nonlinear State Space Model for Identifying At-Risk Students in Open Online Courses (FW0, LC0), pp. 527–532.
ICPCICPC-2016-BeckMW #comparison #composition #multi #visual notation
Identifying modularization patterns by visual comparison of multiple hierarchies (FB0, JM, DW), pp. 1–10.
ICPCICPC-2016-FernandezBAIG #component
Glyph-based software component identification (IF, AB, JPSA, AI, TG), pp. 1–10.
ICPCICPC-2016-SuBKS
Identifying functionally similar code in complex codebases (FHS, JB0, GEK, SS), pp. 1–10.
ICSMEICSME-2016-WieseSSTG #ambiguity #heuristic #multi
Who is Who in the Mailing List? Comparing Six Disambiguation Heuristics to Identify Multiple Addresses of a Participant (ISW, JTdS, IS, CT, MAG), pp. 345–355.
SANERSANER-2016-DamZ #classification #natural language
Software Language Identification with Natural Language Classifiers (JKvD, VZ), pp. 624–628.
SANERSANER-2016-MendesVHS #random #using
Identifying Utility Functions Using Random Forests (TM, MTV, ACH, AS), pp. 614–618.
CIKMCIKM-2016-0064NRR #detection #framework #learning #multi
A Multiple Instance Learning Framework for Identifying Key Sentences and Detecting Events (WW0, YN, HR, NR), pp. 509–518.
CIKMCIKM-2016-ManshaKKA #network #self #speech
A Self-Organizing Map for Identifying InfluentialCommunities in Speech-based Networks (SM, FK, AK, AA), pp. 1965–1968.
CIKMCIKM-2016-NguyenGMD #multi
Multiple Infection Sources Identification with Provable Guarantees (HTN0, PG, MLM, TND), pp. 1663–1672.
ECIRECIR-2016-PotthastBBDFGKL #information retrieval #research #web
Who Wrote the Web? Revisiting Influential Author Identification Research Applicable to Information Retrieval (MP, SB, TB, FD, FF, JMG, JK, WL, FM, MEM, RP, BR, LR, TR, TS, MT, SW, BS0, ES, MH), pp. 393–407.
ICPRICPR-2016-AdakCB #testing
Writer identification by training on one script but testing on another (CA, BBC, MB), pp. 1153–1158.
ICPRICPR-2016-Alonso-PerezERS
A foveation technique applied to face de-identification (VAP, REC, JMRC, LES), pp. 4268–4273.
ICPRICPR-2016-BertoliniOS #difference #multi #using
Multi-script writer identification using dissimilarity (DB, LSO, RS), pp. 3025–3030.
ICPRICPR-2016-CarbonneauGG #learning #multi #random #using
Witness identification in multiple instance learning using random subspaces (MAC, EG, GG), pp. 3639–3644.
ICPRICPR-2016-HeCL #re-engineering
Cross-view transformation based sparse reconstruction for person re-identification (WXH, YCC, JHL), pp. 3410–3415.
ICPRICPR-2016-HsiaoC #algorithm #orthogonal #re-engineering #recognition
Over-atoms accumulation orthogonal matching pursuit reconstruction algorithm for fish recognition and identification (YHH, CCC), pp. 1071–1076.
ICPRICPR-2016-JermanPLSC #analysis #automation
Automatic cutting plane identification for computer-aided analysis of intracranial aneurysms (TJ, FP, BL, ZS, AC), pp. 1484–1489.
ICPRICPR-2016-KsibiMA
Topological weighted fisher vectors for person re-identification (SK, MM, CBA), pp. 3097–3102.
ICPRICPR-2016-LiGYZ
Person re-identification via person DPM based partition (SL, CG, HY, JZ), pp. 3856–3861.
ICPRICPR-2016-LinK
Improving cross sensor interoperability for fingerprint identification (CL, AK0), pp. 943–948.
ICPRICPR-2016-MaoFWH #kernel #performance
Fast kernel SVM training via support vector identification (XM, ZF, OW, WH), pp. 1554–1559.
ICPRICPR-2016-MartinelFM #distributed
Distributed and Unsupervised Cost-Driven Person Re-Identification (NM, GLF, CM), pp. 1225–1230.
ICPRICPR-2016-Martinho-Corbishley #semantics
Retrieving relative soft biometrics for semantic identification (DMC, MSN, JNC), pp. 3067–3072.
ICPRICPR-2016-MatsukawaS #using
Person re-identification using CNN features learned from combination of attributes (TM, ES), pp. 2428–2433.
ICPRICPR-2016-MeiDSB #network
Scene text script identification with Convolutional Recurrent Neural Networks (JM, LD, BS, XB), pp. 4053–4058.
ICPRICPR-2016-NishiyamaNYYIS #physics #using
Person re-identification using co-occurrence attributes of physical and adhered human characteristics (MN, SN, TY, HY, YI, KS), pp. 2085–2090.
ICPRICPR-2016-PratesS #kernel
Kernel Hierarchical PCA for person re-identification (RFdCP, WRS), pp. 2091–2096.
ICPRICPR-2016-RaymondI
Bus trajectory identification by map-matching (RR, TI), pp. 1618–1623.
ICPRICPR-2016-SamarasMP #robust
Robustness in blind camera identification (SS, VM, IP), pp. 3874–3879.
ICPRICPR-2016-ShwetaE0B #architecture #interactive #learning
A deep learning architecture for protein-protein Interaction Article identification (S, AE, SS0, PB), pp. 3128–3133.
ICPRICPR-2016-WangZWGSH #learning #metric #similarity
Contextual Similarity Regularized Metric Learning for person re-identification (JW0, JZ, ZW, CG, NS, RH0), pp. 2048–2053.
ICPRICPR-2016-ZhaoSJ #classification #robust
Robust signal identification for dynamic pattern classification (RZ, GS, QJ), pp. 3910–3915.
KDDKDD-2016-CartonHJMPWCPHG
Identifying Police Officers at Risk of Adverse Events (SC, JH, KJ, AM, YP, JW, CC, CPTEP, LH, RG), pp. 67–76.
KDDKDD-2016-HanZWZ #interactive
Generalized Hierarchical Sparse Model for Arbitrary-Order Interactive Antigenic Sites Identification in Flu Virus Data (LH0, YZ0, XFW, TZ0), pp. 865–874.
KDDKDD-2016-WulczynKVHWBG
Identifying Earmarks in Congressional Bills (EW, MK, VV, MH, JW, CB, RG), pp. 303–311.
KDDKDD-2016-YuCG #network #social
Identifying Decision Makers from Professional Social Networks (SY, EC, AG), pp. 333–342.
ASEASE-2016-Greene0 #developer #mining #named #open source
CVExplorer: identifying candidate developers by mining and exploring their open source contributions (GJG, BF), pp. 804–809.
ASEASE-2016-ThakurG #specification
Identifying domain elements from textual specifications (JST, AG), pp. 566–577.
FSEFSE-2016-Costa #collaboration
Identifying participants for collaborative merge (CC), pp. 1100–1102.
FSEFSE-2016-FordSGP #stack overflow
Paradise unplugged: identifying barriers for female participation on stack overflow (DF, JS0, PJG, CP), pp. 846–857.
FSEFSE-2016-Meng #fine-grained
Fine-grained binary code authorship identification (XM), pp. 1097–1099.
ICSE-2016-LinLZZ #named #problem
iDice: problem identification for emerging issues (QL, JGL, HZ0, DZ), pp. 214–224.
ICSE-2016-XiaoCKMF #architecture
Identifying and quantifying architectural debt (LX0, YC, RK, RM, QF), pp. 488–498.
CASECASE-2016-HuYLD #automation #petri net #scalability
Critical stages and their identification in large scale automated manufacturing systems via Petri nets (HH, YY, YL0, ND), pp. 413–420.
CASECASE-2016-LiZHS #detection #fault
Fusing system configuration information for building cooling plant Fault Detection and severity level identification (DL, YZ, GH, CJS), pp. 1319–1325.
CASECASE-2016-OetingerKS #design #parametricity
Parameter identification and controller design for high-rack feeder systems and fork lifts (DO, KLK, OS), pp. 509–514.
CASECASE-2016-RonB #industrial #modelling #probability
Stochastic modelling and identification of industrial robots (MR, PB), pp. 342–347.
CASECASE-2016-TanCT #automation #component #diagrams #preprocessor
Automated identification of components in raster piping and instrumentation diagram with minimal pre-processing (WCT, IMC, HKT), pp. 1301–1306.
QoSAQoSA-2015-DurisicST #architecture #set #standard
Identifying Optimal Sets of Standardized Architectural Features: A Method and its Automotive Application (DD, MS, MT), pp. 103–112.
WICSAWICSA-2015-LiLA #architecture #technical debt
Architectural Technical Debt Identification Based on Architecture Decisions and Change Scenarios (ZL, PL, PA), pp. 65–74.
DRRDRR-2015-LiGTY #documentation
Cross-reference identification within a document (SL, LG, ZT, YY), p. 940209.
JCDLJCDL-2015-WeissmanABL #wiki
Identifying Duplicate and Contradictory Information in Wikipedia (SW, SA, JB, JJL), pp. 57–60.
SIGMODSIGMOD-2015-RazniewskiKNS #database #query
Identifying the Extent of Completeness of Query Answers over Partially Complete Databases (SR, FK, WN, DS), pp. 561–576.
EDMEDM-2015-MostowGEG #automation #learning #word
Automatic Identification of Nutritious Contexts for Learning Vocabulary Words (JM, DG, RE, RG), pp. 266–273.
EDMEDM-2015-RiddleBGMCCP #mining
Mining a Written Values Affirmation Intervention to Identify the Unique Linguistic Features of Stigmatized Groups (TR, SB, WG, SM, GC, JC, VPV), pp. 274–281.
EDMEDM-2015-SharmaJD #towards
Identifying Styles and Paths toward Success in MOOCs (KS, PJ, PD), pp. 408–411.
ICSMEICSME-2015-BaloghABVGV #developer #interactive
Identifying wasted effort in the field via developer interaction data (GB, GA, ÁB, LV, TG, AZV), pp. 391–400.
MSRMSR-2015-BlincoeHD #ecosystem #git #using
Ecosystems in GitHub and a Method for Ecosystem Identification Using Reference Coupling (KB, FH, DD), pp. 202–211.
MSRMSR-2015-GuptaSPA #challenge #overview #process #scalability
Identifying Software Process Management Challenges: Survey of Practitioners in a Large Global IT Company (MG, AS, SP, AMA), pp. 346–356.
SANERSANER-2015-InfanteB
Efficiently identifying object production sites (AI, AB), pp. 575–579.
SANERSANER-2015-OumarouAEDK
Identifying the exact fixing actions of static rule violation (HO, NA, AE, SD, DTK), pp. 371–379.
SANERSANER-2015-QiuSM #graph #library #morphism #using
Library functions identification in binary code by using graph isomorphism testings (JQ, XS, PM), pp. 261–270.
SANERSANER-2015-RahmanR
TextRank based search term identification for software change tasks (MMR, CKR), pp. 540–544.
SANERSANER-2015-SharmaTL #automation #named #twitter
NIRMAL: Automatic identification of software relevant tweets leveraging language model (AS, YT, DL), pp. 449–458.
SCAMSCAM-2015-GhafariGR #automation #testing
Automatically identifying focal methods under test in unit test cases (MG, CG, KR), pp. 61–70.
LATALATA-2015-UlyantsevZS #automaton #symmetry
BFS-Based Symmetry Breaking Predicates for DFA Identification (VU, IZ, AS), pp. 611–622.
CHICHI-2015-FlatlaATKS #named #people
ColourID: Improving Colour Identification for People with Impaired Colour Vision (DRF, ARA, RDT, DLK, CS), pp. 3543–3552.
CHICHI-2015-HolzBK #mobile #named #using
Bodyprint: Biometric User Identification on Mobile Devices Using the Capacitive Touchscreen to Scan Body Parts (CH, SB, MK), pp. 3011–3014.
HCIDHM-EH-2015-ColomboFRV15a #automation
Automatic Identification of Below-Knee Residuum Anatomical Zones (GC, GF, CR, AV), pp. 327–335.
HCIDUXU-UI-2015-SunJ
Lyricon (Lyrics + Earcons) Improves Identification of Auditory Cues (YS, MJ), pp. 382–389.
HCIHIMI-IKC-2015-WangN #analysis #matrix
Dot Matrix Analysis of Plant Operation Data for Identifying Sequential Alarms Triggered by Single Root Cause (ZW, MN), pp. 152–158.
HCISCSM-2015-VillelaXP #collaboration #network
Identifying Collaboration Strategies in Scientific Collaboration Networks (MLBV, SX, ROP), pp. 253–264.
ICEISICEIS-v1-2015-EnriquezLGMC #open data #problem
Entity Identification Problem in Big and Open Data (JGE, VL, MG, FJDM, MJEC), pp. 404–408.
ICEISICEIS-v1-2015-PfaffK #automation #benchmark #classification #documentation #metric #natural language
Natural Language Processing Techniques for Document Classification in IT Benchmarking — Automated Identification of Domain Specific Terms (MP, HK), pp. 360–366.
ICEISICEIS-v2-2015-BeraOC #component #modelling #representation #variability
Evidence-based SMarty Support for Variability Identification and Representation in Component Models (MHGB, EOJ, TEC), pp. 295–302.
ICEISICEIS-v2-2015-JuniorP #approach #named #ontology #requirements
OnTheme/Doc — An Ontology-based Approach for Crosscutting Concern Identification from Software Requirements (PAPJ, RADP), pp. 188–200.
ICEISICEIS-v3-2015-Wissotzki #approach #process
A Process Approach for Capability Identification and Management (MW), pp. 204–212.
CIKMCIKM-2015-BerardiEMO0 #automation #classification
Semi-Automated Text Classification for Sensitivity Identification (GB, AE, CM, IO, FS0), pp. 1711–1714.
CIKMCIKM-2015-BizidNBFD #learning #microblog #sequence
Identification of Microblogs Prominent Users during Events by Learning Temporal Sequences of Features (IB, NN, PB, SF, AD), pp. 1715–1718.
CIKMCIKM-2015-KourogiFKN #social #social media
Identifying Attractive News Headlines for Social Media (SK, HF, AK, HN), pp. 1859–1862.
CIKMCIKM-2015-MazumderMP #consistency #twitter
Identifying Top-k Consistent News-Casters on Twitter (SM, SM, DP), pp. 1875–1878.
CIKMCIKM-2015-RezvaniLXL #network #scalability #social
Identifying Top-k Structural Hole Spanners in Large-Scale Social Networks (MR, WL, WX, CL), pp. 263–272.
ECIRECIR-2015-GogMP #on the #statistics #using
On Identifying Phrases Using Collection Statistics (SG, AM, MP), pp. 278–283.
ICMLICML-2015-GeigerZSGJ #component #process
Causal Inference by Identification of Vector Autoregressive Processes with Hidden Components (PG, KZ, BS, MG, DJ), pp. 1917–1925.
ICMLICML-2015-WuGS #combinator #feedback #finite #on the
On Identifying Good Options under Combinatorially Structured Feedback in Finite Noisy Environments (YW, AG, CS), pp. 1283–1291.
KDDKDD-2015-KicKimanR #social #social media #towards
Towards Decision Support and Goal Achievement: Identifying Action-Outcome Relationships From Social Media (EK, MR), pp. 547–556.
KDDKDD-2015-LakkarajuASMBGA #framework #machine learning #student
A Machine Learning Framework to Identify Students at Risk of Adverse Academic Outcomes (HL, EA, CS, DM, NB, RG, KLA), pp. 1909–1918.
KDDKDD-2015-RongCM #modelling #social #why
Why It Happened: Identifying and Modeling the Reasons of the Happening of Social Events (YR, HC, ZM), pp. 1015–1024.
KDDKDD-2015-ShaabaniASB
Early Identification of Violent Criminal Gang Members (ES, AA, PS, JB), pp. 2079–2088.
KDDKDD-2015-ShahafHM
Inside Jokes: Identifying Humorous Cartoon Captions (DS, EH, RM), pp. 1065–1074.
MLDMMLDM-2015-Babu #classification #using
Offline Writer Identification in Tamil Using Bagged Classification Trees (SB), pp. 342–354.
SEKESEKE-2015-Tasse #analysis #metric #using
Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
SEKESEKE-2015-TironiMRM #approach #learning
An approach to identify relevant subjects for supporting the Learning Scheme creation task (HT, ALAM, SSR, AM), pp. 506–511.
SEKESEKE-2015-YangL #classification #requirements
Identification and Classification of Requirements from App User Reviews (HY, PL), pp. 7–12.
SIGIRSIGIR-2015-AlbakourMO #data type #metadata #topic #using
Using Sensor Metadata Streams to Identify Topics of Local Events in the City (MDA, CM, IO), pp. 711–714.
SIGIRSIGIR-2015-HarelY #clustering #query
Modularity-Based Query Clustering for Identifying Users Sharing a Common Condition (MGOH, EYT), pp. 819–822.
MoDELSMoDELS-2015-StephanC #clone detection #detection #using
Identification of Simulink model antipattern instances using model clone detection (MS, JRC), pp. 276–285.
ESEC-FSEESEC-FSE-2015-Konopka #dependence #eye tracking #navigation
Combining eye tracking with navigation paths for identification of cross-language code dependencies (MK), pp. 1057–1059.
ESEC-FSEESEC-FSE-2015-ZhengMZ #capacity #constraints #problem #process
A method to identify and correct problematic software activity data: exploiting capacity constraints and data redundancies (QZ, AM, MZ), pp. 637–648.
SACSAC-2015-Chakraborti #multi #optimisation #summary #topic
Multi-document text summarization for competitor intelligence: a methodology based on topic identification and artificial bee colony optimization (SC), pp. 1110–1111.
SACSAC-2015-FahnrichSP #database #in memory #search-based
Facing the genome data deluge: efficiently identifying genetic variants with in-memory database technology (CF, MPS, HP), pp. 18–25.
SACSAC-2015-Jung0B #analysis #embedded #encoding #power management
Identification of embedded control units by state encoding and power consumption analysis (EJ, CM, LB), pp. 1957–1959.
SACSAC-2015-StegagnoMB #distributed
Distributed target identification in robotic swarms (PS, CM, HHB), pp. 307–313.
CASECASE-2015-BasileCC #modelling #petri net #realtime
Real time identification of Time Petri net faulty models (FB, PC, JC), pp. 280–285.
CASECASE-2015-RonBF
Identification of operations at robotic welding lines (MR, PB, OF), pp. 470–476.
CASECASE-2015-RoyelYLLH #optimisation #parametricity #using
A hysteresis model and parameter identification for MR pin joints using immune particle swarm optimization (SR, YY, YL, JL, QPH), pp. 1319–1324.
DACDAC-2015-TashjianD #on the #using
On using control signals for word-level identification in a gate-level netlist (ET, AD), p. 6.
DATEDATE-2015-ChungSS
Identifying redundant inter-cell margins and its application to reducing routing congestion (WC, SS, YS), pp. 1659–1664.
DATEDATE-2015-DoblerHRPRB #adaptation #named
Bordersearch: an adaptive identification of failure regions (MD, MH, MR, GP, WR, MB), pp. 1036–1041.
DATEDATE-2015-OyaSYT #classification
A score-based classification method for identifying hardware-trojans at gate-level netlists (MO, YS, MY, NT), pp. 465–470.
DATEDATE-2015-SteinhorstL #composition
Topology identification for smart cells in modular batteries (SS, ML), pp. 1249–1252.
PDPPDP-2015-LuWWCZ #named #performance
RaceChecker: Efficient Identification of Harmful Data Races (KL, ZW, XW, CC, XZ), pp. 78–85.
PPoPPPPoPP-2015-JinLMLLPCK #automation #benchmark #generative #metric #modelling #parallel #statistics
Combining phase identification and statistic modeling for automated parallel benchmark generation (YJ, ML, XM, QL, JSL, NP, JYC, SK), pp. 269–270.
ICSTICST-2015-CarboneCPP #security #testing
Security Threat Identification and Testing (RC, LC, AP, SEP), pp. 1–8.
ICTSSICTSS-2015-GrozSPO #finite #sequence #state machine #using
Inferring Finite State Machines Without Reset Using State Identification Sequences (RG, AdSS, AP, CO), pp. 161–177.
DRRDRR-2014-FielHGS #documentation
Writer identification on historical Glagolitic documents (SF, FH, MG, RS), pp. 902102–10.
DRRDRR-2014-TaghvaA #fault #web
Utilizing web data in identification and correction of OCR errors (KT, SA), pp. 902109–6.
HTHT-2014-KumarHL #approach #behaviour #twitter
A behavior analytics approach to identifying tweets from crisis regions (SK, XH, HL), pp. 255–260.
HTHT-2014-Saez-Trumper #twitter
Fake tweet buster: a webtool to identify users promoting fake news ontwitter (DST), pp. 316–317.
JCDLJCDL-2014-BatjargalKKM #database #image #multi #using
Identifying the same records across multiple Ukiyo-e image databases using textual data in different languages (BB, TK, FK, AM), pp. 193–196.
JCDLJCDL-2014-SultanBS #automation #concept #education #towards
Towards automatic identification of core concepts in educational resources (MAS, SB, TS), pp. 379–388.
VLDBVLDB-2014-LiagourisT #knowledge base #owl #performance
Efficient Identification of Implicit Facts in Incomplete OWL2-EL Knowledge Bases (JL, MT), pp. 1993–2004.
EDMEDM-2014-YeKB #learning #mining #multi #process
Mining and Identifying Relationships Among Sequential Patterns in Multi-Feature, Hierarchical Learning Activity Data (CY, JSK, GB), pp. 389–390.
ITiCSEITiCSE-2014-FalknerVF #learning #self
Identifying computer science self-regulated learning strategies (KF, RV, NJGF), pp. 291–296.
ITiCSEITiCSE-2014-TedreBMC #classification #concept #education #towards
Towards identification and classification of core and threshold concepts in methodology education in computing (MT, DB, SMB, JCC), pp. 237–242.
SANERCSMR-WCRE-2014-AntinyanSMOWWHH #agile #case study #development #experience #industrial #risk management
Identifying risky areas of software code in Agile/Lean software development: An industrial experience report (VA, MS, WM, , EW, JW, AH, JH), pp. 154–163.
ICPCICPC-2014-EshkevariACP #php
Identifying and locating interference issues in PHP applications: the case of WordPress (LME, GA, JRC, MDP), pp. 157–167.
ICPCICPC-2014-White #data type #named
dsOli: data structure operation location and identification (DHW), pp. 48–52.
ICSMEICSME-2014-AlalfiRSSDC #automation #modelling #representation #variability
Semi-automatic Identification and Representation of Subsystem Variability in Simulink Models (MHA, EJR, AS, MS, TRD, JRC), pp. 486–490.
MSRMSR-2014-NguyenNHNF #automation #case study #industrial #performance
An industrial case study of automatically identifying performance regression-causes (THDN, MN, AEH, MNN, PF), pp. 232–241.
SCAMSCAM-2014-KawamitsuIKKRI #repository #reuse #similarity #source code #using
Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity (NK, TI, TK, RGK, CDR, KI), pp. 305–314.
SCAMSCAM-2014-MondalRS #automation #refactoring
Automatic Identification of Important Clones for Refactoring and Tracking (MM, CKR, KAS), pp. 11–20.
AIIDEAIIDE-2014-Valls-VargasZO #automation #towards
Toward Automatic Role Identification in Unannotated Folk Tales (JVV, JZ, SO).
FDGFDG-2014-HicksCB #game studies #quality
Part of the game: Changing level creation to identify and filter low quality user-generated levels (AH, VC, TB).
FDGFDG-2014-YangHR #game studies #predict
Identifying patterns in combat that are predictive of success in MOBA games (PY, BEH, DLR).
CHICHI-2014-HayashiMH #gesture #using
Wave to me: user identification using body lengths and natural gestures (EH, MM, JIH), pp. 3453–3462.
CHICHI-2014-ReetzG #gesture
Making big gestures: effects of gesture size on observability and identification for co-located group awareness (AR, CG), pp. 4087–4096.
CSCWCSCW-2014-ShoresHSKR #game studies #multi
The identification of deviance and its impact on retention in a multiplayer game (KBS, YH, KLS, RK, JR), pp. 1356–1365.
HCIDUXU-ELAS-2014-GeabelJHABA #using
Pilgrim Smart Identification Using RFID Technology (PSI) (AG, KJ, RAH, RA, MB, MA), pp. 273–280.
HCIDUXU-TMT-2014-Tao #analysis #user interface
Grammatical Analysis of User Interface Events for Task Identification (YT), pp. 197–205.
HCIHCI-AIMT-2014-ChakravartyC #artificial reality #using
Frontal-Standing Pose Based Person Identification Using Kinect (KC, TC), pp. 215–223.
HCIHCI-AS-2014-Stopka #mobile #requirements
Identification of User Requirements for Mobile Applications to Support Door-to-Door Mobility in Public Transport (US), pp. 513–524.
HCIHCI-TMT-2014-MattosPP #interactive
Can Users Speak for Themselves? Investigating Users Ability to Identify Their Own Interactive Breakdowns (BAMM, RLSP, ROP), pp. 521–532.
HCIHCI-TMT-2014-PenderL
Identifying Intention and Perception Mismatches in Digitally Augmented Museum Settings (HLP, DL), pp. 565–576.
HCIHIMI-AS-2014-JiangLLC #network #sequence
Neural Networks for Identifying Civil Pilot’s Operation Sequences (ZJ, QL, YL, BC), pp. 241–252.
HCISCSM-2014-FrischlichRR #social
I’d Rather Die Than Be with You: The Effects of Mortality Salience and Negative Social Identity on Identification with a Virtual Group (LF, DR, OR), pp. 440–451.
HCISCSM-2014-LeonardoFGPSSUWC #social #social media #trust
Identifying Locations of Social Significance: Aggregating Social Media Content to Create a New Trust Model for Exploring Crowd Sourced Data and Information (ADL, SF, AG, FP, WS, TS, AU, DW, JBC), pp. 170–177.
HCISCSM-2014-Scheiner #dependence #social #social media
The Importance of Social Media as Source of Information in the Technology Identification in Dependence of External and Internal Factors (CWS), pp. 103–112.
CAiSECAiSE-2014-GralhaG0 #composition #modelling #requirements
Identifying Modularity Improvement Opportunities in Goal-Oriented Requirements Models (CG, MG, JA), pp. 91–104.
CAiSECAiSE-2014-SimouKKG #challenge #forensics
Cloud Forensics: Identifying the Major Issues and Challenges (SS, CK, EK, SG), pp. 271–284.
ICEISICEIS-v2-2014-HoosGKM #analysis #framework #mobile #process
Improving Business Processes Through Mobile Apps — An Analysis Framework to Identify Value-added App Usage Scenarios (EH, CG, SK, BM), pp. 71–82.
CIKMCIKM-2014-ElsawyMM #social #social media
TweetMogaz v2: Identifying News Stories in Social Media (EE, MM, WM), pp. 2042–2044.
CIKMCIKM-2014-GuptaB #query
Identifying Time Intervals of Interest to Queries (DG, KB), pp. 1835–1838.
CIKMCIKM-2014-HasanainEM #microblog
Identification of Answer-Seeking Questions in Arabic Microblogs (MH, TE, WM), pp. 1839–1842.
CIKMCIKM-2014-LiangZHGB #named #novel #sentiment #word
CONR: A Novel Method for Sentiment Word Identification (JL, XZ, YH, LG, SB), pp. 1943–1946.
CIKMCIKM-2014-Liu0LXL #towards
Towards Pathway Variation Identification: Aligning Patient Records with a Care Pathway (HL, YL, XL, GTX, GTL), pp. 1359–1368.
CIKMCIKM-2014-LuSY #network #social
Identifying Your Customers in Social Networks (CTL, HHS, PSY), pp. 391–400.
CIKMCIKM-2014-WenR #behaviour #mining #online
Identifying Latent Study Habits by Mining Learner Behavior Patterns in Massive Open Online Courses (MW, CPR), pp. 1983–1986.
CIKMCIKM-2014-ZengBLLL #keyword #named #query #relational
ExpressQ: Identifying Keyword Context and Search Target in Relational Keyword Queries (ZZ, ZB, TNL, MLL, TWL), pp. 31–40.
ECIRECIR-2014-MeguebliKDP #approach
Unsupervised Approach for Identifying Users’ Political Orientations (YM, MK, BLD, FP), pp. 507–512.
ICMLICML-c2-2014-ZhouCL #crowdsourcing #multi
Optimal PAC Multiple Arm Identification with Applications to Crowdsourcing (YZ, XC, JL), pp. 217–225.
ICPRICPR-2014-BertoliniOJS
Assessing Textural Features for Writer Identification on Different Writing Styles and Forgeries (DB, LSO, EJRJ, RS), pp. 268–272.
ICPRICPR-2014-ChanK #geometry #image #using
Using Leg Geometry to Align Androgenic Hair Patterns in Low Resolution Images for Criminal and Victim Identification (FKSC, AWKK), pp. 495–500.
ICPRICPR-2014-ChaudhariGN #online
Unsupervised Focus Group Identification from Online Product Reviews (SC, RG, BN), pp. 1886–1891.
ICPRICPR-2014-ChenZW #learning #metric
Relevance Metric Learning for Person Re-identification by Exploiting Global Similarities (JC, ZZ, YW), pp. 1657–1662.
ICPRICPR-2014-DuCZ #aspect-oriented #using
A Product Aspects Identification Method by Using Translation-Based Language Model (JD, WC, XZ), pp. 2790–2795.
ICPRICPR-2014-EikvilH #automation #evaluation #performance
Evaluation of Binary Descriptors for Fast and Fully Automatic Identification (LE, MH), pp. 154–159.
ICPRICPR-2014-FeckerAMEF #documentation
Writer Identification for Historical Arabic Documents (DF, AA, VM, JES, TF), pp. 3050–3055.
ICPRICPR-2014-GarciaMFGM
Person Orientation and Feature Distances Boost Re-identification (JG, NM, GLF, AG, CM), pp. 4618–4623.
ICPRICPR-2014-GuoCLHS #ambiguity #automation #multi
Multi-shot Person Re-identification with Automatic Ambiguity Inference and Removal (CCG, SZC, JHL, XJH, SCS), pp. 3540–3545.
ICPRICPR-2014-HeS #invariant
Delta-n Hinge: Rotation-Invariant Features for Writer Identification (SH, LS), pp. 2023–2028.
ICPRICPR-2014-KrishFROB
Pre-registration for Improved Latent Fingerprint Identification (RPK, JF, DRC, JOG, JB), pp. 696–701.
ICPRICPR-2014-KumarPJ #music
Identifying Ragas in Indian Music (VK, HP, CVJ), pp. 767–772.
ICPRICPR-2014-LiuZC #learning #metric #multi #parametricity
Parametric Local Multi-modal Metric Learning for Person Re-identification (KL, ZCZ, AC), pp. 2578–2583.
ICPRICPR-2014-MatsukawaOS
Person Re-identification via Discriminative Accumulation of Local Features (TM, TO, YS), pp. 3975–3980.
ICPRICPR-2014-NegiC #image #set
Identifying Diverse Set of Images in Flickr (SN, SC), pp. 3624–3629.
ICPRICPR-2014-RenL14a #matrix
Person Re-identification Based on Relaxed Nonnegative Matrix Factorization with Regularizations (WR, GL), pp. 4654–4659.
ICPRICPR-2014-SantanaLH #geometry #people #semantics
People Semantic Description and Re-identification from Point Cloud Geometry (MCS, JLN, DHS), pp. 4702–4707.
ICPRICPR-2014-ShivakumaraSPBT #video
Gradient-Angular-Features for Word-wise Video Script Identification (PS, NS, UP, MB, CLT), pp. 3098–3103.
ICPRICPR-2014-ShivramRG #case study #comparative #modelling #online
Data Sufficiency for Online Writer Identification: A Comparative Study of Writer-Style Space vs. Feature Space Models (AS, CR, VG), pp. 3121–3125.
ICPRICPR-2014-YangD #novel #using
Novel HHT-Based Features for Biometric Identification Using EEG Signals (SY, FD), pp. 1922–1927.
ICPRICPR-2014-YangLLYL #estimation #modelling
Color Models and Weighted Covariance Estimation for Person Re-identification (YY, SL, ZL, DY, SZL), pp. 1874–1879.
ICPRICPR-2014-YiLLL #learning #metric
Deep Metric Learning for Person Re-identification (DY, ZL, SL, SZL), pp. 34–39.
KDDKDD-2014-DundarYR #towards
Batch discovery of recurring rare classes toward identifying anomalous samples (MD, HZY, BR), pp. 223–232.
KDDKDD-2014-KloumannK #community #set
Community membership identification from small seed sets (IMK, JMK), pp. 1366–1375.
KDDKDD-2014-LiDDCZ #process
Identifying and labeling search tasks via query-based hawkes processes (LL, HD, AD, YC, HZ), pp. 731–740.
KDDKDD-2014-XueWCG
Identifying tourists from public transport commuters (MX, HW, WC, WSN, GHG), pp. 1779–1788.
KDIRKDIR-2014-BarbantanLP #approach #health #ontology
Disease Identification in Electronic Health Records — An Ontology based Approach (IB, CL, RP), pp. 261–268.
KDIRKDIR-2014-BarcanteJDCCS #mining #using
Identifying Drug Repositioning Targets using Text Mining (EB, MJ, FD, EC, OGC, FS), pp. 348–353.
KDIRKDIR-2014-JohnsonC #clustering #network
Mathematical Foundations of Networks Supporting Cluster Identification (JEJ, JWC), pp. 277–285.
KDIRKDIR-2014-OkumuraYSO #twitter
Identifying Tweets that Contain a “Heartwarming Story” (MO, YY, MS, HO), pp. 323–326.
MLDMMLDM-2014-AbdullahiCM #approach #novel #using
A Novel Approach for Identifying Banded Patterns in Zero-One Data Using Column and Row Banding Scores (FBA, FC, RM), pp. 58–72.
SEKESEKE-2014-AdjoyanSS #legacy #metric #migration #object-oriented #quality #towards
Service Identification Based on Quality Metrics — Object-Oriented Legacy System Migration Towards SOA (SA, ADS, AS), pp. 1–6.
SEKESEKE-2014-NetoC
Identifying Threats to Validity and Control Actions in the Planning Stages of Controlled Experiments (AAN, TC), pp. 256–261.
SEKESEKE-2014-SantosM #detection
Identifying strategies on god class detection in two controlled experiments (JAMS, MGM), pp. 244–249.
SEKESEKE-2014-YangL #agile #architecture #development
Identifying and Recording Software Architectural Assumptions in Agile Development (CY, PL), pp. 308–313.
SIGIRSIGIR-2014-WangZZL #keyword #twitter
Efficiently identify local frequent keyword co-occurrence patterns in geo-tagged Twitter stream (XW, YZ, WZ, XL), pp. 1215–1218.
ECMFAECMFA-2014-MartinezZKT #variability #visualisation
Identifying and Visualising Commonality and Variability in Model Variants (JM, TZ, JK, YLT), pp. 117–131.
SPLCSPLC-2014-AngererPLGG #dependence #graph #product line
Identifying inactive code in product lines with configuration-aware system dependence graphs (FA, HP, DL, AG, PG), pp. 52–61.
ECOOPECOOP-2014-NittaKT #framework
Identifying Mandatory Code for Framework Use via a Single Application Trace (NN, IK, YT), pp. 593–617.
RERE-2014-Ionita #evaluation #information management #risk management #security
Context-sensitive Information security Risk identification and evaluation techniques (DI), pp. 485–488.
RERE-2014-MasseyRAS #ambiguity #requirements
Identifying and classifying ambiguity for regulatory requirements (AKM, RLR, AIA, PPS), pp. 83–92.
RERE-2014-RiazKSW #automation #natural language #requirements #security
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts (MR, JTK, JS, LAW), pp. 183–192.
FSEFSE-2014-BosuCHHJ #empirical
Identifying the characteristics of vulnerable code changes: an empirical study (AB, JCC, MH, PH, DJ), pp. 257–268.
SACSAC-2014-AnderssonDA #artificial reality #using
Anthropometric and human gait identification using skeleton data from Kinect sensor (VOA, RD, RMdA), pp. 60–61.
SACSAC-2014-GraziadioDSSUME #game studies #video
Bespoke video games to provide early response markers to identify the optimal strategies for maximizing rehabilitation (SG, RD, KS, KMAS, GU, GM, JAE), pp. 20–24.
SACSAC-2014-HosokawaNY #information retrieval
Location-aware information retrieval for identifying local and distant landmark (YH, YN, TY), pp. 428–435.
SACSAC-2014-HuergoPD #approach #modelling #using
A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
CASECASE-2014-HuangYL #approach
An intelligent approach to identify elderly body information (YPH, WJY, SYL), pp. 824–829.
CASECASE-2014-HuangYTC #design
Design of client device identification by clock skew in clouds (DJH, KTY, WCT, GMC), pp. 1133–1138.
CASECASE-2014-LeeJMC #framework #recognition #robust
Iterative identification framework for robust hand-written digit recognition under extremely noisy conditions (HL, SJ, TM, NYC), pp. 728–733.
DACDAC-2014-SullivanBZZJ #functional #hardware #named
FIGHT-Metric: Functional Identification of Gate-Level Hardware Trustworthiness (DS, JB, GZ, SZ, YJ), p. 4.
DACDAC-2014-WaksmanRSS #analysis #assessment #functional
A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification (AW, JR, MS, SS), p. 4.
DACDAC-2014-WendtKP
Techniques for Foundry Identification (JBW, FK, MP), p. 6.
DACDAC-2014-ZhengBB #analysis #named #robust #towards
CACI: Dynamic Current Analysis Towards Robust Recycled Chip Identification (YZ, AB, SB), p. 6.
DATEDATE-2014-BeneventiBVDB #analysis #logic
Thermal analysis and model identification techniques for a logic + WIDEIO stacked DRAM test chip (FB, AB, PV, DD, LB), pp. 1–4.
OSDIOSDI-2014-ChenKWZK #web
Identifying Information Disclosure in Web Applications with Retroactive Auditing (HC, TK, XW, NZ, MFK), pp. 555–569.
PPoPPPPoPP-2014-IsaacsGBBSH #execution #logic #parallel
Extracting logical structure and identifying stragglers in parallel execution traces (KEI, TG, AB, PTB, MS, BH), pp. 397–398.
TACASTACAS-2014-BozzanoCGT #component #design #detection #fault #logic #using
Formal Design of Fault Detection and Identification Components Using Temporal Epistemic Logic (MB, AC, MG, ST), pp. 326–340.
ISSTAISSTA-2014-NejatiB #constraints #cpu #trade-off #using
Identifying optimal trade-offs between CPU time usage and temporal constraints using search (SN, LCB), pp. 351–361.
HTHT-2013-KumarMZL
Whom should I follow?: identifying relevant users during crises (SK, FM, RZ, HL), pp. 139–147.
ICDARICDAR-2013-AlkalaiBSL #analysis
Improving Formula Analysis with Line and Mathematics Identification (MA, JBB, VS, XL), pp. 334–338.
ICDARICDAR-2013-AmaralFB #feature model #forensics
Feature Selection for Forensic Handwriting Identification (AMMMA, COdAF, FB), pp. 922–926.
ICDARICDAR-2013-ChenL
Alternatives for Page Skew Compensation in Writer Identification (JC, DPL), pp. 927–931.
ICDARICDAR-2013-DanielsB
Discriminating Features for Writer Identification (ZAD, HSB), pp. 1385–1389.
ICDARICDAR-2013-FerrerMP
LBP Based Line-Wise Script Identification (MAF, AM, UP), pp. 369–373.
ICDARICDAR-2013-FielS #retrieval #using #visual notation
Writer Identification and Writer Retrieval Using the Fisher Vector on Visual Vocabularies (SF, RS), pp. 545–549.
ICDARICDAR-2013-HangargeSP
Directional Discrete Cosine Transform for Handwritten Script Identification (MH, KCS, RP), pp. 344–348.
ICDARICDAR-2013-JainD13a #using
Writer Identification Using an Alphabet of Contour Gradient Descriptors (RJ, DSD), pp. 550–554.
ICDARICDAR-2013-KchaouKO #independence #online
Text-Independent Writer Identification on Online Arabic Handwriting (MGK, SK, JMO), pp. 428–432.
ICDARICDAR-2013-KhanKS #problem #question #verification
Can Signature Biometrics Address Both Identification and Verification Problems? (SHK, ZK, FS), pp. 981–985.
ICDARICDAR-2013-KimLT #classification #heuristic #using
Identification of Investigator Name Zones Using SVM Classifiers and Heuristic Rules (JK, DXL, GRT), pp. 140–144.
ICDARICDAR-2013-KleberFDS #database #named #retrieval #word
CVL-DataBase: An Off-Line Database for Writer Retrieval, Writer Identification and Word Spotting (FK, SF, MD, RS), pp. 560–564.
ICDARICDAR-2013-LouloudisGSP #contest
ICDAR 2013 Competition on Writer Identification (GL, BG, NS, AP), pp. 1397–1401.
ICDARICDAR-2013-MalikLAOBF #contest #verification
ICDAR 2013 Competitions on Signature Verification and Writer Identification for On- and Offline Skilled Forgeries (SigWiComp 2013) (MIM, ML, LA, WO, MB, BF), pp. 1477–1483.
ICDARICDAR-2013-Newell #question #what
What Should We Be Comparing for Writer Identification? (AJN), pp. 418–422.
ICDARICDAR-2013-RaniDL #multi
Script Identification of Pre-segmented Multi-font Characters and Digits (RR, RD, GSL), pp. 1150–1154.
ICDARICDAR-2013-SaidaniEB #word
Identification of Machine-Printed and Handwritten Words in Arabic and Latin Scripts (AS, AKE, AB), pp. 798–802.
ICDARICDAR-2013-SharmaCPB #video
Word-Wise Script Identification from Video Frames (NS, SC, UP, MB), pp. 867–871.
JCDLJCDL-2013-FenlonV #library
Local histories in global digital libraries: identifying demand and evaluating coverage (KF, VEVJ), pp. 191–194.
JCDLJCDL-2013-HeMNS #using
Identification of works of manga using LOD resources: an experimental FRBRization of bibliographic data of comic books (WH, TM, MN, SS), pp. 253–256.
JCDLJCDL-2013-RoochiTHH #case study #social #social media
Identification of useful user comments in social media: a case study on flickr commons (EMR, KT, BH, GJH), pp. 1–10.
PODSPODS-2013-Gottlob #polynomial
Deciding monotone duality and identifying frequent itemsets in quadratic logspace (GG), pp. 25–36.
SIGITESIGITE-2013-LuntA #source code
Identifying information technology graduate-level programs (BML, MQA), pp. 55–58.
CSMRCSMR-2013-KazatoHKOOMHS #feature model #incremental #source code
Incremental Feature Location and Identification in Source Code (HK, SH, TK, TO, SO, SM, TH, MS), pp. 371–374.
ICPCICPC-2013-MondalRS #co-evolution #empirical
Insight into a method co-change pattern to identify highly coupled methods: An empirical study (MM, CKR, KAS), pp. 103–112.
ICSMEICSM-2013-Karus #automation #development
Automatic Means of Identifying Evolutionary Events in Software Development (SK), pp. 412–415.
ICSMEICSM-2013-LiguCCY #smell
Identification of Refused Bequest Code Smells (EL, AC, TC, NY), pp. 392–395.
ICSMEICSM-2013-RoehmBHP #behaviour #specification #towards
Towards Identification of Software Improvements and Specification Updates by Comparing Monitored and Specified End-User Behavior (TR, BB, TMH, BP), pp. 464–467.
ICSMEICSM-2013-ToroiRV #case study #process #testing
Identifying Process Improvement Targets in Test Processes: A Case Study (TT, AR, LV), pp. 11–19.
MSRMSR-2013-ManiNMNSN #debugging #repository
Bug resolution catalysts: identifying essential non-committers from bug repositories (SM, SN, DM, RN, VSS, AAN), pp. 193–202.
DiGRADiGRA-2013-FortimG #community #exclamation #women
Attention whore! Perception of female players who identify themselves as women in the communities of MMOs (IF, CdMG).
DiGRADiGRA-2013-GreuterT #game studies #student
Engaging students in OH&S hazard identification through a game (SG, ST).
DiGRADiGRA-2013-NixonB #interactive
Press X for Meaning: Interaction Leads to Identification in Heavy Rain (MN, JB).
CHICHI-2013-BirnbaumBFDK #behaviour #using
Using behavioral data to identify interviewer fabrication in surveys (BEB, GB, ADF, BD, ARK), pp. 2911–2920.
CHICHI-2013-HaraLF #artificial reality #crowdsourcing #problem
Combining crowdsourcing and google street view to identify street-level accessibility problems (KH, VL, JF), pp. 631–640.
CSCWCSCW-2013-SmithQC #analysis #using
Finger on the pulse: identifying deprivation using transit flow analysis (CSC, DQ, LC), pp. 683–692.
HCIDUXU-CXC-2013-CarignanK #case study #gamification
Case Study: Identifying Gamification Opportunities in Sales Applications (JC, SLK), pp. 501–507.
HCIHCI-AMTE-2013-SantosM #automation #design #implementation #interactive
Design and Implementation of ErgoIdentifier: A Tool for Automated Identification of Websites Interaction Elements (OFdS, MM), pp. 249–255.
HCIHCI-UC-2013-RodilJRW #representation
Identifying and Representing Elements of Local Contexts in Namibia (KR, KLJ, MR, HWT), pp. 332–341.
HCIHIMI-HSM-2013-SakamotoT #interactive
Identification of Agency through Virtual Embodied Interaction (TS, YT), pp. 301–307.
HCIOCSC-2013-RichterBKF #contest #idea #online
Online Idea Contests: Identifying Factors for User Retention (SR, SPB, GK, JF), pp. 76–85.
ICEISICEIS-J-2013-SuB13a #fine-grained #graph #security
Foundation for Fine-Grained Security and DRM Control Based on a Service Call Graph Context Identification (ZS, FB), pp. 226–241.
CIKMCIKM-2013-GuGZLG #effectiveness #named #towards
AnchorMF: towards effective event context identification (HG, MG, LZ, QL, DG), pp. 629–638.
ECIRECIR-2013-PritsosS #automation #classification
Open-Set Classification for Automated Genre Identification (DAP, ES), pp. 207–217.
ICMLICML-c1-2013-BubeckWV #multi
Multiple Identifications in Multi-Armed Bandits (SB, TW, NV), pp. 258–265.
KDDKDD-2013-SunBK #optimisation #polynomial
Quadratic optimization to identify highly heritable quantitative traits from complex phenotypic features (JS, JB, HRK), pp. 811–819.
KDDKDD-2013-WangDYWCSI #clustering #data mining #framework #mining #towards
Towards long-lead forecasting of extreme flood events: a data mining framework for precipitation cluster precursors identification (DW, WD, KY, XW, PC, DLS, SI), pp. 1285–1293.
KDDKDD-2013-ZhouLSYWY #named
FeaFiner: biomarker identification from medical data through feature generalization and selection (JZ, ZL, JS, LY, FW, JY), pp. 1034–1042.
KDIRKDIR-KMIS-2013-BastosBGRCSF #modelling
Managing Information and Knowledge — A Proposal Methodology for Building an Integrated Model based on Information Assets Identification (CAMB, ACMB, ASG, LSdR, MAFC, MLdS, SJMdSF), pp. 520–525.
KEODKEOD-2013-GeibelEZKJSBMNSTUFTSHT #documentation #information management #ontology
Patient Identification for Clinical Trials with Ontology-based Information Extraction from Documents (PG, HE, LZ, SK, KJ, JS, AB, FM, CHN, JFS, ST, TU, MF, MT, TS, AH, TT), pp. 230–236.
KEODKEOD-2013-SagaeF #development #image
Knowledge Resource Development for Identifying Matching Image Descriptions (AS, SEF), pp. 100–108.
MLDMMLDM-2013-ChungJKL #personalisation #recommendation
Personalized Expert-Based Recommender System: Training C-SVM for Personalized Expert Identification (YC, HWJ, JK, JHL), pp. 434–441.
SEKESEKE-2013-AnchietaSM #case study #diagrams #prototype #uml #user interface #using
Using NLP Techniques for Identifying GUI Prototypes and UML Diagrams From Use Cases (RTA, RFdS, RSM), pp. 48–53.
SEKESEKE-2013-DengWH #algorithm #combinator #multi #using
Combining multiple stress identification algorithms using combinatorial fusion (YD, ZW, DFH), pp. 421–428.
SEKESEKE-2013-KayaF
Identifying Extract Method Opportunities Based on Variable References (MK, JWF), pp. 153–158.
SEKESEKE-2013-Kung #case study #on the
On Use Case Identification (DCK), pp. 759–764.
SEKESEKE-2013-LosadaJ #documentation #semantics
Processing rhetorical, morphosyntactic, and semantic features from corporate technical documents for identifying organizational domain knowledge (BML, CMZJ), pp. 268–272.
SEKESEKE-2013-MarcalGCJ #mining #repository #using
Mining Software Repository to Identify Crosscutting Concerns Using Combined Techniques (IM, REG, RCMC, COJ), pp. 338–343.
SPLCSPLC-2013-KoziolekGGDS #analysis #case study #experience #reuse
Experiences from identifying software reuse opportunities by domain analysis (HK, TG, TdG, DD, SS), pp. 208–217.
REER-BR-2013-OliveiraBLC #portuguese
Utilizando sistemas de conhecimento para a identificação da presença de metas flexíveis em uma linguagem de domínio (ADPO, JLB, CL, LC).
RERE-2013-NcubeLD #challenge #requirements #research
Identifying top challenges for international research on requirements engineering for systems of systems engineering (CN, SLL, HD), pp. 342–344.
RERE-2013-ZarghamiVESW #risk management
Assumption-based risk identification method (ARM) in dynamic service provisioning (AZ, EV, MZE, MvS, RW), pp. 175–184.
REFSQREFSQ-2013-CallelePW #interface #requirements #risk management
Risk Identification at the Interface between Business Case and Requirements (DC, BP, KW), pp. 253–268.
ASEASE-2013-SumnerZ #analysis #execution
Identifying execution points for dynamic analyses (WNS, XZ), pp. 81–91.
ESEC-FSEESEC-FSE-2013-BlincoeVD #coordination #dependence
Do all task dependencies require coordination? the role of task properties in identifying critical coordination needs in software projects (KB, GV, DD), pp. 213–223.
ESEC-FSEESEC-FSE-2013-GarciaPSHM #distributed
Identifying message flow in distributed event-based systems (JG, DP, GS, WGJH, NM), pp. 367–377.
ICSEICSE-2013-ChoudharyPO #named #web
X-PERT: accurate identification of cross-browser issues in web applications (SRC, MRP, AO), pp. 702–711.
ICSEICSE-2013-Ell #developer #network
Identifying failure inducing developer pairs within developer networks (JE), pp. 1471–1473.
ICSEICSE-2013-Khalid #on the
On identifying user complaints of iOS apps (HK), pp. 1474–1476.
SACSAC-2013-AraujoGA #artificial reality #towards #using
Towards skeleton biometric identification using the microsoft kinect sensor (RMA, GG, VA), pp. 21–26.
SACSAC-2013-HerzogKHFK #automation #web
Feature-based object identification for web automation (CH, IK, WH, RRF, BKS), pp. 742–749.
SACSAC-2013-InzingerHSLD #implementation #using
Identifying incompatible service implementations using pooled decision trees (CI, WH, BS, PL, SD), pp. 485–492.
SACSAC-2013-KumarR #algorithm #data type #online
Online identification of frequently executed acyclic paths by leveraging data stream algorithms (GK, SR), pp. 1694–1695.
SACSAC-2013-PorterA #algorithm
An evolutionary spline fitting algorithm for identifying filamentous cyanobacteria (JP, DVA), pp. 40–45.
CASECASE-2013-BengtssonL #algorithm #behaviour #modelling #using #visualisation
Operation behavior modeling using relation identification and visualization algorithms (KB, BL), pp. 368–373.
CASECASE-2013-JuLXA #evaluation #performance #quality
Integrated model of productivity and quality in serial production lines with repairs: Performance evaluation and bottleneck identification (FJ, JL, GX, JA), pp. 783–788.
CCCC-2013-KempfVP #parallel
Compiler-Guided Identification of Critical Sections in Parallel Code (SK, RV, MP), pp. 204–223.
DACDAC-2013-YousofshahiOLH #capacity #nondeterminism
Gene modification identification under flux capacity uncertainty (MY, MO, KL, SH), p. 5.
DATEDATE-2013-BernardiBSRB #embedded #fault #online
On-line functionally untestable fault identification in embedded processor cores (PB, MB, ES, MSR, OB), pp. 1462–1467.
DATEDATE-2013-DiversiBTBB
SCC thermal model identification via advanced bias-compensated least-squares (RD, AB, AT, FB, LB), pp. 230–235.
DATEDATE-2013-LagraaTP #concurrent #data access #data mining #memory management #mining #simulation
Data mining MPSoC simulation traces to identify concurrent memory access patterns (SL, AT, FP), pp. 755–760.
PDPPDP-2013-SuboticSLV #data flow #modelling #programming
Identifying Critical Code Sections in Dataflow Programming Models (VS, JCS, JL, MV), pp. 29–37.
TACASTACAS-2013-WhiteL #data type #evolution #in memory #learning #memory management
Identifying Dynamic Data Structures by Learning Evolving Patterns in Memory (DHW, GL), pp. 354–369.
ICSTICST-2013-Mercaldo #database #process
Identification of Anomalies in Processes of Database Alteration (FM), pp. 513–514.
ISSTAISSTA-2013-XiaoHZX #performance
Context-sensitive delta inference for identifying workload-dependent performance bottlenecks (XX, SH, DZ, TX), pp. 90–100.
WICSA-ECSAWICSA-ECSA-2012-KebirSCC #approach #component #object-oriented
Quality-Centric Approach for Software Component Identification from Object-Oriented Code (SK, ADS, SC, AC), pp. 181–190.
DRRDRR-2012-KimLT #classification
Combining SVM classifiers to identify investigator name zones in biomedical articles (JK, DXL, GRT).
DRRDRR-2012-LinGTHL #documentation #embedded #using
Identification of embedded mathematical formulas in PDF documents using SVM (XL, LG, ZT, XH, XL).
DRRDRR-2012-PorwalRG #framework
An Oracle-based co-training framework for writer identification in offline handwriting (UP, SR, VG).
JCDLJCDL-2012-FosterSDOS #concept #education
Identifying core concepts in educational resources (JMF, MAS, HD, IO, TS), pp. 35–42.
TPDLTPDL-2012-BolandREM #dataset
Identifying References to Datasets in Publications (KB, DR, KE, BM), pp. 150–161.
TPDLTPDL-2012-MenesesFS #distributed #documentation #fault
Identifying “Soft 404” Error Pages: Analyzing the Lexical Signatures of Documents in Distributed Collections (LM, RF, FS), pp. 197–208.
VLDBVLDB-2012-AgarwalRB #clustering #graph #realtime
Real Time Discovery of Dense Clusters in Highly Dynamic Graphs: Identifying Real World Events in Highly Dynamic Environments (MKA, KR, MB), pp. 980–991.
VLDBVLDB-2012-AngelKSS #maintenance #realtime #streaming
Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story Identification (AA, NK, NS, DS), pp. 574–585.
SIGITESIGITE-2012-ShaikhK #delphi #education #learning #metric
Identifying measures to foster teachers’ competence for personal learning environment conceived teaching scenarios: a delphi study (ZAS, SAK), pp. 127–132.
SIGITESIGITE-2012-UzokaCGJ #education #industrial #project management #requirements #standard
Identifying the link between project management standards and practices in IT education and the industry expectations and requirements (FMEU, AC, KG, JJ), pp. 91–92.
CSMRCSMR-2012-BertranAGCS #architecture #on the
On the Relevance of Code Anomalies for Identifying Architecture Degradation Symptoms (IMB, RA, AG, CC, AvS), pp. 277–286.
CSMRCSMR-2012-HottaHK #dependence #graph #refactoring
Identifying, Tailoring, and Suggesting Form Template Method Refactoring Opportunities with Program Dependence Graph (KH, YH, SK), pp. 53–62.
CSMRCSMR-2012-KlattDKKSW #component #evolution
Identify Impacts of Evolving Third Party Components on Long-Living Software Systems (BK, ZD, HK, KK, JS, RW), pp. 461–464.
CSMRCSMR-2012-MurtazaSHC #comparison #kernel #on the
On the Comparison of User Space and Kernel Space Traces in Identification of Software Anomalies (SSM, AS, AHL, MC), pp. 127–136.
CSMRCSMR-2012-NonnenI #monitoring
Identifying Knowledge Divergence by Vocabulary Monitoring in Software Projects (JN, PI), pp. 441–446.
CSMRCSMR-2012-TianSL #debugging
Improved Duplicate Bug Report Identification (YT, CS, DL), pp. 385–390.
CSMRCSMR-2012-ZiadiFSZ #source code
Feature Identification from the Source Code of Product Variants (TZ, LF, MAAdS, MZ), pp. 417–422.
ICPCICPC-2012-AlawnehH #communication
Identifying computational phases from inter-process communication traces of HPC applications (LA, AHL), pp. 133–142.
ICSMEICSM-2012-BertranACGS #architecture
Supporting the identification of architecturally-relevant code anomalies (IMB, RA, EC, AG, AvS), pp. 662–665.
CHICHI-2012-HollandKT #algorithm #detection #usability #visual notation
Identifying usability issues via algorithmic detection of excessive visual search (CH, OK, DET), pp. 2943–2952.
CSCWCSCW-2012-PalMK
Question temporality: identification and uses (AP, JM, JAK), pp. 257–260.
CSCWCSCW-2012-ZhuKK12a #modelling #online #social
Organizing without formal organization: group identification, goal setting and social modeling in directing online production (HZ, RK, AK), pp. 935–944.
EDOCEDOC-2012-HarrisonBADN #detection #framework
A Framework for Detecting Malware in Cloud by Identifying Symptoms (KH, BB, STTA, CID, APN), pp. 164–172.
CIKMCIKM-2012-BalogN12a #query
Hierarchical target type identification for entity-oriented queries (KB, RN), pp. 2391–2394.
CIKMCIKM-2012-CamposBDC #feature model
Time feature selection for identifying active household members (PGC, AB, FD, IC), pp. 2311–2314.
CIKMCIKM-2012-CamposDJN #approach #higher-order #named #web
GTE: a distributional second-order co-occurrence approach to improve the identification of top relevant dates in web snippets (RC, GD, AJ, CN), pp. 2035–2039.
CIKMCIKM-2012-RamachandranG #graph #representation
A word-order based graph representation for relevance identification (LR, EFG), pp. 2327–2330.
CIKMCIKM-2012-YuR #query
Role-explicit query identification and intent role annotation (HY, FR), pp. 1163–1172.
ECIRECIR-2012-DasMG #classification #topic
Phrase Pair Classification for Identifying Subtopics (SD, PM, CLG), pp. 489–493.
ICMLICML-2012-BootsG #problem
Two Manifold Problems with Applications to Nonlinear System Identification (BB, GJG), p. 8.
ICMLICML-2012-PrasseSLS #email #learning #regular expression
Learning to Identify Regular Expressions that Describe Email Campaigns (PP, CS, NL, TS), p. 146.
ICMLICML-2012-RossB #learning #modelling
Agnostic System Identification for Model-Based Reinforcement Learning (SR, DB), p. 247.
ICPRICPR-2012-ChandaPF
Font identification — In context of an Indic script (SC, UP, KF), pp. 1655–1658.
ICPRICPR-2012-ChenL
Exploiting ruling line artifacts in writer identification (JC, DPL), pp. 3737–3740.
ICPRICPR-2012-DattaBFP #modelling #using
Appearance modeling for person re-identification using Weighted Brightness Transfer Functions (AD, LMGB, RF, SP), pp. 2367–2370.
ICPRICPR-2012-DuAL #evaluation
Evaluation of color spaces for person re-identification (YD, HA, SL), pp. 1371–1374.
ICPRICPR-2012-KawaiMHIY #using
Person re-identification using view-dependent score-level fusion of gait and color features (RK, YM, CH, HI, YY), pp. 2694–2697.
ICPRICPR-2012-MinCMD #3d #realtime
Real-time 3D face identification from a depth camera (RM, JC, GGM, JLD), pp. 1739–1742.
ICPRICPR-2012-NejatiZSM0 #image
Wonder ears: Identification of identical twins from ear images (HN, LZ, TS, EMM, DG), pp. 1201–1204.
ICPRICPR-2012-OliverAA #3d #people
3D descriptor for people re-identification (JO, AA, AA), pp. 1395–1398.
ICPRICPR-2012-SnellCK
Texture and shape in fluorescence pattern identification for auto-immune disease diagnosis (VS, WJC, JK), pp. 3750–3753.
ICPRICPR-2012-TakalaP #dataset #named #network #people
CMV100: A dataset for people tracking and re-identification in sparse camera networks (VT, MP), pp. 1387–1390.
ICPRICPR-2012-TanK #image
Human identification from at-a-distance images by simultaneously exploiting iris and periocular features (CWT, AK), pp. 553–556.
ICPRICPR-2012-TyagiKFSR #classification
Fusing biographical and biometric classifiers for improved person identification (VT, HPK, TAF, LVS, NKR), pp. 2351–2354.
ICPRICPR-2012-YiicelMH #evaluation #modelling
Modeling and identification of group motion via compound evaluation of positional and directional cues (ZY, TM, NH), pp. 1172–1176.
KDDKDD-2012-Mayer #internet #multi
Bootstrapped language identification for multi-site internet domains (UFM), pp. 579–585.
KDDKDD-2012-WangZSY #community #network #social
Magnet community identification on social networks (GW, YZ, XS, PSY), pp. 588–596.
KDIRKDIR-2012-FengYS #documentation #robust
Robust Template Identification of Scanned Documents (XF, AY, SS), pp. 103–110.
KDIRKDIR-2012-SchonebergM #documentation
Contextual Approaches for Identification of Toponyms in Ancient Documents (HS, FM), pp. 163–168.
KDIRKDIR-2012-SorkhiAHH #framework #game studies #network #social
A Game-Theoretic Framework to Identify Top-K Teams in Social Networks (MS, HA, SH, AH), pp. 252–257.
MLDMMLDM-2012-HossainC #behaviour
Combination of Physiological and Behavioral Biometric for Human Identification (EH, GC), pp. 380–393.
SEKESEKE-2012-BoaratiP #design #guidelines #interface
Identification Guidelines for the Design of Interfaces in the context of ECAs and ADHD (SRSB, CSAP), pp. 594–598.
SEKESEKE-2012-MaZQQXY #analysis #dependence #design pattern #using
Identification of Design Patterns Using Dependence Analysis (WM, XZ, XQ, JQ, LX, RY), pp. 289–292.
SEKESEKE-2012-MiaoCLZZ #clustering #correctness #fault #locality #testing
Identifying Coincidental Correctness for Fault Localization by Clustering Test Cases (YM, ZC, SL, ZZ, YZ), pp. 267–272.
SIGIRSIGIR-2012-SpinaMROBB #aspect-oriented #microblog
Identifying entity aspects in microblog posts (DS, EM, MdR, AO, MTB, MB), pp. 1089–1090.
SIGIRSIGIR-2012-TanGS #exclamation
$100, 000 prize jackpot. call now!: identifying the pertinent features of SMS spam (HT, NG, MS), pp. 1175–1176.
SIGIRSIGIR-2012-ZhangXCHDALC #information management #semantics #sentiment #syntax
Sentiment identification by incorporating syntax, semantics and context information (KZ, YX, YC, DH, DD, AA, WkL, ANC), pp. 1143–1144.
SPLCSPLC-2012-LeitnerZTW #variability
Requirement identification for variability management in a co-simulation environment (AL, JZ, PT, DW), pp. 269–274.
SPLCSPLC-2012-PatzkeBSSSF #case study #evolution #product line
Identifying improvement potential in evolving product line infrastructures: 3 case studies (TP, MB, MS, KS, JES, TF), pp. 239–248.
TOOLSTOOLS-EUROPE-2012-MarrD #abstraction #concurrent #implementation #multi #virtual machine
Identifying a Unifying Mechanism for the Implementation of Concurrency Abstractions on Multi-language Virtual Machines (SM, TD), pp. 171–186.
RERE-2012-CharradaKG #requirements #source code
Identifying outdated requirements based on source code changes (EBC, AK, MG), pp. 61–70.
RERE-2012-Todoran #communication #in the cloud #named #requirements
StakeCloud: Stakeholder requirements communication and resource identification in the cloud (IT), pp. 353–356.
REFSQREFSQ-2012-BeckersFKS
A Pattern-Based Method for Identifying and Analyzing Laws (KB, SF, JCK, HS), pp. 256–262.
ASEASE-2012-Meananeatra #maintenance #refactoring #sequence
Identifying refactoring sequences for improving software maintainability (PM), pp. 406–409.
ASEASE-2012-MorenoM #automation #java #named
JStereoCode: automatically identifying method and class stereotypes in Java code (LM, AM), pp. 358–361.
ICSEICSE-2012-MengWZM #approach #evolution #framework
A history-based matching approach to identification of framework evolution (SM, XW, LZ, HM), pp. 353–363.
ICSEICSE-2012-MitchellS #process
Software process improvement through the identification and removal of project-level knowledge flow obstacles (SMM, CBS), pp. 1265–1268.
ICSEICSE-2012-TianLL #debugging #linux
Identifying Linux bug fixing patches (YT, JLL, DL), pp. 386–396.
ICSEICSE-2012-Vetro #automation #static analysis #technical debt #using
Using automatic static analysis to identify technical debt (AV), pp. 1613–1615.
ICSEICSE-2012-Yu #analysis #using
Improving failure-inducing changes identification using coverage analysis (KY), pp. 1604–1606.
SACSAC-2012-MakanjuZML #clustering #composition #detection
Spatio-temporal decomposition, clustering and identification for alert detection in system logs (AM, ANZH, EEM, ML), pp. 621–628.
SACSAC-2012-MaruhashiTT #using
A method for identification of moving objects by integrative use of a camera and accelerometers (NM, TT, MT), pp. 1–6.
SACSAC-2012-ParkDNDKK #memory management #named
HotDataTrap: a sampling-based hot data identification scheme for flash memory (DP, BKD, YN, DHCD, YK, YK), pp. 1610–1617.
SACSAC-2012-SantosCSLB #analysis #heuristic #modelling #process
Analysis of heuristics to identify crosscutting concerns in business process models (FJNS, CC, FMS, JCSdPL, TVB), pp. 1725–1726.
SACSAC-2012-SardinhaYNR #aspect-oriented #named #traceability
EA-tracer: identifying traceability links between code aspects and early aspects (AS, YY, NN, AR), pp. 1035–1042.
ASPLOSASPLOS-2012-JoaoSMP #parallel #scheduling #thread
Bottleneck identification and scheduling in multithreaded applications (JAJ, MAS, OM, YNP), pp. 223–234.
CASECASE-2012-HeZWZ #using
Identification of dynamic posture in lower extremity using optical fiber sensor (CH, XZ, YW, ZZ), pp. 1057–1060.
CASECASE-2012-LiuJCLX #analysis #canonical #correlation #fault #linear #research
Research on fault identification for complex system based on generalized linear canonical correlation analysis (DL, DJ, XC, AL, GX), pp. 474–478.
CASECASE-2012-WakamatsuAMAH #image #towards
Property identification of a deformable belt object from its static images toward its manipulation (HW, MA, EM, EA, SH), pp. 448–453.
DACDAC-2012-ZhangTT #using
Identification of recovered ICs using fingerprints from a light-weight on-chip sensor (XZ, NT, MT), pp. 703–708.
DATEDATE-2012-RudolfTWW #automation #configuration management
Automated critical device identification for configurable analogue transistors (RR, PT, RW, PRW), pp. 858–861.
ISMMISMM-2012-InoueN #hardware #java #source code
Identifying the sources of cache misses in Java programs without relying on hardware counters (HI, TN), pp. 133–142.
PPoPPPPoPP-2012-SimDKV #analysis #framework #performance
A performance analysis framework for identifying potential benefits in GPGPU applications (JS, AD, HK, RWV), pp. 11–22.
ICSTICST-2012-GhandehariLXKK #combinator #testing
Identifying Failure-Inducing Combinations in a Combinatorial Test Set (LSGG, YL, TX, DRK, RK), pp. 370–379.
ICSTSAT-2012-ZhangMZ #constraints #interactive #optimisation #theorem proving
Faulty Interaction Identification via Constraint Solving and Optimization (JZ, FM, ZZ), pp. 186–199.
ECSAECSA-2011-StolAB #design pattern #evaluation #open source #process
Design and Evaluation of a Process for Identifying Architecture Patterns in Open Source Software (KJS, PA, MAB), pp. 147–163.
DRRDRR-2011-ChenCL #constraints #using
Using perturbed handwriting to support writer identification in the presence of severe data constraints (JC, WC, DPL), pp. 1–10.
DRRDRR-2011-CutterBSB #using
Font group identification using reconstructed fonts (MPC, JvB, FS, TMB), pp. 1–10.
DRRDRR-2011-KimLT #automation #using
Automated identification of biomedical article type using support Vector machines (ICK, DXL, GRT), pp. 1–10.
DRRDRR-2011-SiddiqiKV #analysis
Feature relevance analysis for writer identification (IS, KK, NV), pp. 1–10.
DRRDRR-2011-YouADRGT #automation #documentation #hybrid #image #retrieval #towards
Automatic identification of ROI in figure images toward improving hybrid (text and image) biomedical document retrieval (DY, SA, DDF, MMR, VG, GRT), pp. 1–10.
HTHT-2011-ChoudhuryCC #social #social media
Identifying relevant social media content: leveraging information diversity and user cognition (MDC, SC, MC), pp. 161–170.
ICDARICDAR-2011-BerettaL #algorithm #evaluation #performance
Performance Evaluation of Algorithms for Newspaper Article Identification (RB, LL), pp. 394–398.
ICDARICDAR-2011-BuiVPO #recognition #using #word
Writer Identification Using TF-IDF for Cursive Handwritten Word Recognition (QAB, MV, SP, JMO), pp. 844–848.
ICDARICDAR-2011-CaoPN #adaptation #recognition
OCR-Driven Writer Identification and Adaptation in an HMM Handwriting Recognition System (HC, RP, PN), pp. 739–743.
ICDARICDAR-2011-CaoPN11a #markov #modelling #recognition #using
Handwritten and Typewritten Text Identification and Recognition Using Hidden Markov Models (HC, RP, PN), pp. 744–748.
ICDARICDAR-2011-ChaabouniBKAA #independence #modelling #multi #online
Multi-fractal Modeling for On-line Text-Independent Writer Identification (AC, HB, MK, AMA, HEA), pp. 623–627.
ICDARICDAR-2011-ChaabouniBKAA11a #feature model #online
Combining of Off-line and On-line Feature Extraction Approaches for Writer Identification (AC, HB, MK, AMA, HEA), pp. 1299–1303.
ICDARICDAR-2011-ChandaFP
Identification of Indic Scripts on Torn-Documents (SC, KF, UP), pp. 713–717.
ICDARICDAR-2011-DuL #privacy
Preservative License Plate De-identification for Privacy Protection (LD, HL), pp. 468–472.
ICDARICDAR-2011-FornesDGL #contest #music
The ICDAR 2011 Music Scores Competition: Staff Removal and Writer Identification (AF, AD, AG, JL), pp. 1511–1515.
ICDARICDAR-2011-GhoshC #detection #image
Composite Script Identification and Orientation Detection for Indian Text Images (SG, BBC), pp. 294–298.
ICDARICDAR-2011-HassaineAAJB #contest
The ICDAR2011 Arabic Writer Identification Contest (AH, SAM, JMA, AJ, AB), pp. 1470–1474.
ICDARICDAR-2011-JainD #using
Offline Writer Identification Using K-Adjacent Segments (RJ, DSD), pp. 769–773.
ICDARICDAR-2011-KimL #library
Functional-Based Table Category Identification in Digital Library (SK, YL), pp. 1364–1368.
ICDARICDAR-2011-LinGTLH #documentation
Mathematical Formula Identification in PDF Documents (XL, LG, ZT, XL, XH), pp. 1419–1423.
ICDARICDAR-2011-LouloudisSG #contest
ICDAR 2011 Writer Identification Contest (GL, NS, BG), pp. 1475–1479.
ICDARICDAR-2011-PhanSDLT #video
Video Script Identification Based on Text Lines (TQP, PS, ZD, SL, CLT), pp. 1240–1244.
JCDLJCDL-2011-GollapalliGMC #library #on the
On identifying academic homepages for digital libraries (SDG, CLG, PM, CC), pp. 123–132.
JCDLJCDL-2011-MurthyLHFPDT #using
Use of subimages in fish species identification: a qualitative study (UM, LTL, EH, EAF, MAPQ, LMLD, RdST), pp. 185–194.
ITiCSEITiCSE-2011-GiannakosV #education #predict
Identifying the predictors of educational webcasts’ adoption (MNG, PV), p. 376.
SIGITESIGITE-2011-RoweLH #assessment #framework #source code
An assessment framework for identifying information technology programs (DCR, BML, CRGH), pp. 123–128.
ICPCICPC-J-2009-HammadCM11 #automation #evolution #traceability
Automatically identifying changes that impact code-to-design traceability during evolution (MH, MLC, JIM), pp. 35–64.
ICPCICPC-J-2009-PoonTTK11 #category theory #experience #testing
Contributions of tester experience and a checklist guideline to the identification of categories and choices for software testing (PLP, THT, SFT, FCK), pp. 141–163.
SCAMSCAM-J-2009-DesharnaisAS11 #analysis #metric
Identification and analysis of attributes and base measures within ISO 9126 (JMD, AA, WS), pp. 447–460.
CSMRCSMR-2011-BelderrarKGAG #architecture #evolution #mining #object-oriented
Sub-graph Mining: Identifying Micro-architectures in Evolving Object-Oriented Software (AB, SK, YGG, GA, PG), pp. 171–180.
ICSMEICSM-2011-SoaresMG #implementation #refactoring
Identifying overly strong conditions in refactoring implementations (GS, MM, RG), pp. 173–182.
ICSMEICSM-2011-SyerAH #concurrent #performance #thread
Identifying performance deviations in thread pools (MDS, BA, AEH), pp. 83–92.
ICSMEICSM-2011-YousefiS #distributed #mining
Identifying distributed features in SOA by mining dynamic call trees (AY, KS), pp. 73–82.
DiGRADiGRA-2011-Shaw #exclamation #game studies #quote #representation #video
“He could be a bunny rabbit for all I care!”: Identification with video game characters and arguments for diversity in representation (AS).
FDGFDG-2011-DominguezYR #3d #automation #game studies #generative
Automatic identification and generation of highlight cinematics for 3D games (MD, RMY, SR), pp. 259–261.
CHICHI-2011-EppLM #using
Identifying emotional states using keystroke dynamics (CE, ML, RLM), pp. 715–724.
CHICHI-2011-LinGTMA #people #question
Does domain highlighting help people identify phishing sites? (EL, SG, ET, DM, JA), pp. 2075–2084.
CHICHI-2011-MiyataF #documentation
Document area identification for extending books without markers (AM, KF), pp. 3189–3198.
CHICHI-2011-YoderS #facebook #interface #social
Identifying social capital in the facebook interface (CY, FS), pp. 585–588.
CHICHI-2011-ZhuKWK #wiki
Identifying shared leadership in Wikipedia (HZ, REK, YCW, AK), pp. 3431–3434.
HCIDUXU-v2-2011-KomogortsevTMCH #approach #automation #named #usability
EMA: Automated Eye-Movement-Driven Approach for Identification of Usability Issues (OVK, DET, CJM, JC, CH), pp. 459–468.
HCIHCI-ITE-2011-AokiKIMKK #gesture
Gesture Identification Based on Zone Entry and Axis Crossing (RA, YK, MI, AM, MK, SK), pp. 194–203.
HCIHCI-MIIE-2011-BraunK #smarttech
Passive Identification and Control of Arbitrary Devices in Smart Environments (AB, FK), pp. 147–154.
HCIHCI-MIIE-2011-HyrkkanenN #functional #how #mobile #physics #question
The Virtual Workplace of a Mobile Employee — How Does Vischer’s Model Function in Identifying Physical, Functional and Psychosocial Fit? (UH, SN), pp. 69–75.
HCIHCI-UA-2011-NisimuraMKKI #automation #development #interface #recognition #speech
Development of Web-Based Voice Interface to Identify Child Users Based on Automatic Speech Recognition System (RN, SM, LK, HK, TI), pp. 607–616.
HCIIDGD-2011-ChenCC11b #user interface
Identifying the Features of Friendly User Interfaces from Emotional Perspectives (LCC, PYC, YMC), pp. 293–301.
ICEISICEIS-v2-2011-BaiW #detection #fuzzy #multi
Applying Fuzzy Multiple Criteria Decision Making to Evaluate and Identify Optimal Explosive Detection Equipments (YB, DW), pp. 118–124.
ICEISICEIS-v2-2011-LiOAK #fault #modelling #network #using
Patterns Identification for Hitting Adjacent Key Errors Correction using Neural Network Models (JL, KO, MSA, HBK), pp. 5–12.
ICEISICEIS-v3-2011-JuniorNI #execution #legacy #overview #source code
Survey and Proposal of a Method for Business Rules Identification in Legacy Systems Source Code and Execution Logs (WARJ, GSdN, CI), pp. 207–213.
ICEISICEIS-v3-2011-Li11c #performance
An Efficient Method to Identify Customer Value in Tourist Hotel Management (CL), pp. 165–169.
ICEISICEIS-v3-2011-QuG #analysis #outsourcing #risk management
The Analysis of IT Outsourcing Risk Identification on Principal-agent Theory (LQ, ZG), pp. 488–491.
CIKMCIKM-2011-LiSLKC #twitter
Question identification on twitter (BL, XS, MRL, IK, EYC), pp. 2477–2480.
ICMLICML-2011-LeeW #learning #online #probability
Manifold Identification of Dual Averaging Methods for Regularized Stochastic Online Learning (SL, SJW), pp. 1121–1128.
KDDKDD-2011-NamataKG #graph
Collective graph identification (GN, SK, LG), pp. 87–95.
KDIRKDIR-2011-ReuterC #learning #similarity #using
Learning Similarity Functions for Event Identification using Support Vector Machines (TR, PC), pp. 208–215.
SEKESEKE-2011-ZaatarHH #approach #implementation #product line
An Approach for Identifying and Implementing Aspectual Features inSoftware Product Lines (MAZ, HSH, AEFH), pp. 722–728.
SIGIRSIGIR-2011-CetintasRSF #modelling #network #people #probability #social
Identifying similar people in professional social networks with discriminative probabilistic models (SC, MR, LS, YF), pp. 1209–1210.
SIGIRSIGIR-2011-JethavaCBBD #multi #scalability #using
Scalable multi-dimensional user intent identification using tree structured distributions (VJ, LCB, RABY, CB, DPD), pp. 395–404.
SIGIRSIGIR-2011-YangGU #clustering #self
Identifying points of interest by self-tuning clustering (YY, ZG, LHU), pp. 883–892.
MODELSMoDELS-2011-BavotaGOLTGC #comprehension #diagrams #uml
Identifying the Weaknesses of UML Class Diagrams during Data Model Comprehension (GB, CG, RO, ADL, GT, MG, JACL), pp. 168–182.
MODELSMoDELS-2011-LettnerTM #embedded #migration #overview #problem
A Critical Review of Applied MDA for Embedded Devices: Identification of Problem Classes and Discussing Porting Efforts in Practice (ML, MT, RM), pp. 228–242.
PLEASEPLEASE-2011-Li #evolution #product line
Identifying best practice by analyzing the evolution of the FISCAN MTMSIS software product line (DL), pp. 40–44.
RERE-2011-BoutkovaH #automation #specification
Semi-automatic identification of features in requirement specifications (EB, FH), pp. 313–318.
RERE-2011-MaxwellAS #requirements #taxonomy
A legal cross-references taxonomy for identifying conflicting software requirements (JCM, AIA, PPS), pp. 197–206.
ASEASE-2011-ParizekL #traversal
Identifying future field accesses in exhaustive state space traversal (PP, OL), pp. 93–102.
ICSEICSE-2011-FokaefsTSC #named #refactoring
JDeodorant: identification and application of extract class refactorings (MF, NT, ES, AC), pp. 1037–1039.
ICSEICSE-2011-HolmesN #behaviour
Identifying program, test, and environmental changes that affect behaviour (RH, DN), pp. 371–380.
ICSEICSE-2011-HolmesN11a #behaviour
Identifying opaque behavioural changes (RH, DN), pp. 995–997.
ICSEICSE-2011-LimDF #network #requirements #social #using
StakeSource2.0: using social networks of stakeholders to identify and prioritise requirements (SLL, DD, AF), pp. 1022–1024.
ICSEICSE-2011-OlivetoGBPL #smell
Identifying method friendships to remove the feature envy bad smell (RO, MG, GB, DP, ADL), pp. 820–823.
ICSEICSE-2011-Xiao #developer #generative #problem #testing #towards
Problem identification for structural test generation: first step towards cooperative developer testing (XX), pp. 1179–1181.
ICSEICSE-2011-XiaoXTH #generative #precise #problem #testing
Precise identification of problems for structural test generation (XX, TX, NT, JdH), pp. 611–620.
ICSEICSE-2011-XiaoXTH11a #named #precise #problem
Covana: precise identification of problems in pex (XX, TX, NT, JdH), pp. 1004–1006.
SACSAC-2011-KimDB #dependence #diagrams #state machine #uml
Identifying properties of UML state machine diagrams that affect data and control dependence (HK, VD, DHB), pp. 1464–1469.
SACSAC-2011-TariqBGMTAZ #correlation
Identifying the provenance of correlated anomalies (DT, BB, AG, SM, RT, AA, FZ), pp. 224–229.
SACSAC-2011-WangZG #classification #network
Traffic classification beyond application level: identifying content types from network traces (YW, ZZ, LG), pp. 540–541.
CASECASE-2011-AranovskiyBB #metric
The method of identification for the “motor-dual-section device” system through output signal measurements (SA, AAB, VB), pp. 346–350.
DATEDATE-2011-SreedharK #design #on the #process
On design of test structures for lithographic process corner identification (AS, SK), pp. 800–805.
CAVCAV-2011-AndreychenkoMSW #markov #modelling #parametricity
Parameter Identification for Markov Models of Biochemical Reactions (AA, LM, DS, VW), pp. 83–98.
ECSAECSA-2010-KiwelekarJ10a #architecture #communication #concept analysis
Identifying Architectural Connectors through Formal Concept Analysis of Communication Primitives (AWK, RKJ), pp. 515–518.
HTHT-2010-GippB #approach #detection #independence
Citation based plagiarism detection: a new approach to identify plagiarized work language independently (BG, JB), pp. 273–274.
HTHT-2010-ZhangQHJWHHJ #approach #collaboration #hybrid #web
Collaborative identification and annotation of government deep web resources: a hybrid approach (PZ, YQ, CH, PTJ, JW, WSH, JEH, XJ), pp. 285–286.
JCDLJCDL-2010-AngroshCS #library #random #towards #using
Context identification of sentences in related work sections using a conditional random field: towards intelligent digital libraries (MAA, SC, NS), pp. 293–302.
VLDBVLDB-2010-MathioudakisBK
Identifying, Attributing and Describing Spatial Bursts (MM, NB, NK), pp. 1091–1102.
VLDBVLDB-2010-SettyBBW #named
InZeit: Efficiently Identifying Insightful Time Points (VS, SJB, KB, GW), pp. 1605–1608.
VLDBVLDB-2010-VlachouDNK #query
Identifying the Most Influential Data Objects with Reverse Top-k Queries (AV, CD, KN, YK), pp. 364–372.
EDMEDM-2010-MontalvoBPNG #machine learning #student #using
Identifying Students’ Inquiry Planning Using Machine Learning (OM, RSJdB, MASP, AN, JDG), pp. 141–150.
EDMEDM-2010-ShanabrookCWA #behaviour #student #using
Identifying High-Level Student Behavior Using Sequence-based Motif Discovery (DHS, DGC, BPW, IA), pp. 191–200.
ITiCSEITiCSE-2010-KiesmullerSBR #online #pattern matching #pattern recognition #problem #recognition #using
Online identification of learner problem solving strategies using pattern recognition methods (UK, SS, TB, KR), pp. 274–278.
CSMRCSMR-2010-AsadiPAG #approach #concept #execution #heuristic
A Heuristic-Based Approach to Identify Concepts in Execution Traces (FA, MDP, GA, YGG), pp. 31–40.
ICPCICPC-2010-BernardiL #object-oriented
The ConAn Tool to Identify Crosscutting Concerns in Object Oriented Systems (MLB, GADL), pp. 48–49.
ICPCICPC-2010-SuttonHM #c++ #library
Identification of Idiom Usage in C++ Generic Libraries (AS, RH, JIM), pp. 160–169.
ICSMEICSM-2010-BavotaOLAG #game studies #refactoring
Playing with refactoring: Identifying extract class opportunities through game theory (GB, RO, ADL, GA, YGG), pp. 1–5.
ICSMEICSM-2010-ChoudharyVO #automation #named #web
WEBDIFF: Automated identification of cross-browser issues in web applications (SRC, HV, AO), pp. 1–10.
ICSMEICSM-2010-DraganCM #automation
Automatic identification of class stereotypes (ND, MLC, JIM), pp. 1–10.
ICSMEICSM-2010-JalbertB #clone detection #concurrent #debugging #detection #using
Using clone detection to identify bugs in concurrent software (KJ, JSB), pp. 1–5.
MSRMSR-2010-GegickRX #case study #debugging #industrial #mining #security
Identifying security bug reports via text mining: An industrial case study (MG, PR, TX), pp. 11–20.
MSRMSR-2010-PentaGA #approach #using
Identifying licensing of jar archives using a code-search approach (MDP, DMG, GA), pp. 151–160.
WCREWCRE-2010-AthanasopoulosK #legacy
Identification of REST-like Resources from Legacy Service Descriptions (MA, KK), pp. 215–219.
CIAACIAA-2010-TirnaucaT #automaton #query
Types of Trusted Information That Make DFA Identification with Correction Queries Feasible (CT, CIT), pp. 272–281.
CHICHI-2010-Vaananen-Vainio-MattilaWOS #experience #social #user interface #web #web service
Identifying drivers and hindrances of social user experience in web services (KVVM, MW, JO, KS), pp. 2499–2502.
CAiSECAiSE-2010-WeidlichDM #framework #modelling #process
The ICoP Framework: Identification of Correspondences between Process Models (MW, RMD, JM), pp. 483–498.
ICEISICEIS-AIDSS-2010-SalasPRR #using
Identification of Areas with Similar Wind Patterns using SOFM (JCPS, AAP, JJGdlR, JGR), pp. 40–45.
ICEISICEIS-AIDSS-2010-SilvaCRN #assessment #fault #network
Assessment of the Change in the Number of Neurons in Hidden Layers of Neural Networks for Fault Identification in Electrical Systems (DTdS, PHGC, JAPR, LBN), pp. 309–313.
ICEISICEIS-ISAS-2010-ClariziaGN #query #web
A New Technique for Identification of Relevant Web Pages in Informational Queries Results (FC, LG, PN), pp. 70–79.
ICEISICEIS-ISAS-2010-FerreiraAB #communication #modelling
Identifying Ruptures in Business-IT Communication through Business Models (JJF, RMdA, FAB), pp. 44–51.
ICEISICEIS-J-2010-FerreiraAB10a #communication #modelling
Identifying Ruptures in Business-IT Communication through Business Models (JJF, RMdA, FAB), pp. 311–325.
CIKMCIKM-2010-KamathC #realtime #web
Identifying hotspots on the real-time web (KYK, JC), pp. 1837–1840.
CIKMCIKM-2010-MelliE #concept #ontology
Supervised identification and linking of concept mentions to a domain-specific ontology (GM, ME), pp. 1717–1720.
CIKMCIKM-2010-MiaoLTZ #approach #category theory #community #modelling #topic
Identifying new categories in community question answering archives: a topic modeling approach (YM, CL, JT, LZ), pp. 1673–1676.
CIKMCIKM-2010-PalK #bias #community
Expert identification in community question answering: exploring question selection bias (AP, JAK), pp. 1505–1508.
CIKMCIKM-2010-RaiberK #documentation #on the
On identifying representative relevant documents (FR, OK), pp. 99–108.
ECIRECIR-2010-GottronL #comparison
A Comparison of Language Identification Approaches on Short, Query-Style Texts (TG, NL), pp. 611–614.
ECIRECIR-2010-KarlgrenEST
Between Bags and Trees — Constructional Patterns in Text Used for Attitude Identification (JK, GE, MS, OT), pp. 38–49.
ECIRECIR-2010-Schenkel #web
Temporal Shingling for Version Identification in Web Archives (RS), pp. 508–519.
ICMLICML-2010-SyedR #dataset
Unsupervised Risk Stratification in Clinical Datasets: Identifying Patients at Risk of Rare Outcomes (ZS, IR), pp. 1023–1030.
ICPRICPR-2010-BasakKTR #approach #multi
A Gradient Descent Approach for Multi-modal Biometric Identification (JB, KK, VT, NKR), pp. 1322–1325.
ICPRICPR-2010-BazzaniCPFM #multi
Multiple-Shot Person Re-identification by HPE Signature (LB, MC, AP, MF, VM), pp. 1413–1416.
ICPRICPR-2010-ChaabouniBKAA #multi
Fractal and Multi-fractal for Arabic Offline Writer Identification (AC, HB, MK, AMA, HEA), pp. 3793–3796.
ICPRICPR-2010-ChandaFPW #independence
Text Independent Writer Identification for Bengali Script (SC, KF, UP, TW), pp. 2005–2008.
ICPRICPR-2010-ChandaPFK #perspective
Script Identification — A Han and Roman Script Perspective (SC, UP, KF, FK), pp. 2708–2711.
ICPRICPR-2010-ChuHC #classification #gender #image #set
Identifying Gender from Unaligned Facial Images by Set Classification (WSC, CRH, CSC), pp. 2636–2639.
ICPRICPR-2010-CoutinhoFF #parsing #using
One-Lead ECG-based Personal Identification Using Ziv-Merhav Cross Parsing (DPC, ALNF, MATF), pp. 3858–3861.
ICPRICPR-2010-DuYXGT
Wavelet Domain Local Binary Pattern Features For Writer Identification (LD, XY, HX, ZG, YYT), pp. 3691–3694.
ICPRICPR-2010-GhiasiS #independence #performance
An Efficient Method for Offline Text Independent Writer Identification (GG, RS), pp. 1245–1248.
ICPRICPR-2010-GilliamWC
Scribe Identification in Medieval English Manuscripts (TG, RCW, JAC), pp. 1880–1883.
ICPRICPR-2010-HabedAB #image #parallel
Reconstruction-Free Parallel Planes Identification from Uncalibrated Images (AH, AA, BB), pp. 1828–1831.
ICPRICPR-2010-JungO #image #web
Local Binary Pattern-Based Features for Text Identification of Web Images (IJ, ISO), pp. 4320–4323.
ICPRICPR-2010-KeustermansMVS #automation #modelling #using
Automated Cephalometric Landmark Identification Using Shape and Local Appearance Models (JK, WM, DV, PS), pp. 2464–2467.
ICPRICPR-2010-LariosSSMLD #kernel #random
Haar Random Forest Features and SVM Spatial Matching Kernel for Stonefly Species Identification (NL, BS, LGS, GMM, JL, TGD), pp. 2624–2627.
ICPRICPR-2010-LutfYL #using
Offline Arabic Handwriting Identification Using Language Diacritics (ML, XY, HL), pp. 1912–1915.
ICPRICPR-2010-MarinaiMS #clustering #recognition
Bag of Characters and SOM Clustering for Script Recognition and Writer Identification (SM, BM, GS), pp. 2182–2185.
ICPRICPR-2010-MarsicoNR #named #segmentation
IS_IS: Iris Segmentation for Identification Systems (MDM, MN, DR), pp. 2857–2860.
ICPRICPR-2010-NaseemTB10a #representation
Sparse Representation for Speaker Identification (IN, RT, MB), pp. 4460–4463.
ICPRICPR-2010-PatrauceanGC #invariant #using
Bubble Tag Identification Using an Invariant — Under — Perspective Signature (VP, PG, JC), pp. 408–411.
ICPRICPR-2010-PiroonratanaWUALC #morphism #nondeterminism #ranking #symmetry #using
Identification of Ancestry Informative Markers from Chromosome-Wide Single Nucleotide Polymorphisms Using Symmetrical Uncertainty Ranking (TP, WW, TU, AA, CL, NC), pp. 2448–2451.
ICPRICPR-2010-PutpuekCLS #approach #detection
Unified Approach to Detection and Identification of Commercial Films by Temporal Occurrence Pattern (NP, NC, CL, SS), pp. 3288–3291.
ICPRICPR-2010-SaeidiMKTCJF #independence #speech
Signal-to-Signal Ratio Independent Speaker Identification for Co-channel Speech Signals (RS, PM, TK, ZHT, MGC, SHJ, PF), pp. 4565–4568.
ICPRICPR-2010-SuXCWM #concept
EEG-based Personal Identification: from Proof-of-Concept to A Practical System (FS, LX, AC, YW, JM), pp. 3728–3731.
ICPRICPR-2010-WangLS #documentation #using
Noise Tolerant Script Identification of Printed Oriental and English Documents Using a Downgraded Pixel Density Feature (NW, LL, CYS), pp. 2037–2040.
ICPRICPR-2010-WuS #approach #testing
A Hypothesis Testing Approach for Fluorescent Blob Identification (LSW, SLS), pp. 2476–2479.
ICPRICPR-2010-XuPJ #3d #component
Component Identification in the 3D Model of a Building (MX, MP, MJ), pp. 3061–3064.
ICPRICPR-2010-ZhangST
Hierarchical Fusion of Face and Iris for Personal Identification (XZ, ZS, TT), pp. 217–220.
ICPRICPR-2010-ZhouK #image #locality #using
Personal Identification from Iris Images Using Localized Radon Transform (YZ, AK), pp. 2840–2843.
KDIRKDIR-2010-HaCohen-KernerSS #automation #documentation
Automatic Identification of Biblical Quotations in Hebrew-Aramaic Documents (YHK, NS, YS), pp. 320–325.
KDIRKDIR-2010-KleizaKT #approach #documentation #query #semantics #similarity #visualisation #word
Semantic Identification and Visualization of Significant Words within Documents — Approach to Visualize Relevant Words within Documents to a Search Query by Word Similarity Computation (KK, PK, KDT), pp. 481–486.
KDIRKDIR-2010-KoopmansW #community
Broader Perception for Local Community Identification (FTW(K, TPvdW), pp. 400–403.
KDIRKDIR-2010-Molokov #combinator
Application of Combinatorial Methods to Protein Identification in Peptide Mass Fingerprinting (LM), pp. 307–313.
KEODKEOD-2010-FukumotoS #classification
Identifying Domain-specific Senses and Its Application to Text Classification (FF, YS), pp. 263–268.
KEODKEOD-2010-NG #named
CIS: Change Identification System (NP, VG), pp. 347–350.
RecSysRecSys-2010-Said #hybrid #recommendation
Identifying and utilizing contextual data in hybrid recommender systems (AS), pp. 365–368.
RecSysRecSys-2010-WuGC #multi
Merging multiple criteria to identify suspicious reviews (GW, DG, PC), pp. 241–244.
SIGIRSIGIR-2010-LeeJSL #mining
Mining the blogosphere for top news stories identification (YL, HYJ, WS, JHL), pp. 395–402.
SIGIRSIGIR-2010-LiLX #music #robust
Robust audio identification for MP3 popular music (WL, YL, XX), pp. 627–634.
SIGIRSIGIR-2010-LiLX10a #music #robust
Robust music identification based on low-order zernike moment in the compressed domain (WL, YL, XX), pp. 739–740.
SPLCSPLC-2010-YoshimuraAF #constraints #feature model #mining
A Method to Identify Feature Constraints Based on Feature Selections Mining (KY, YA, TF), pp. 425–429.
OOPSLAOOPSLA-2010-UpadhyayaMP #automation #memory management #source code
Automatic atomic region identification in shared memory SPMD programs (GU, SPM, VSP), pp. 652–670.
RERE-2010-GacituaSG #abstraction #effectiveness #on the #requirements
On the Effectiveness of Abstraction Identification in Requirements Engineering (RG, PS, VG), pp. 5–14.
RERE-2010-YoungA #policy #requirements
A Method for Identifying Software Requirements Based on Policy Commitments (JDY, AIA), pp. 47–56.
ASEASE-2010-GermanMI #automation #source code
A sentence-matching method for automatic license identification of source code files (DMG, YM, KI), pp. 437–446.
ASEASE-2010-KessentiniVS #risk management
Deviance from perfection is a better criterion than closeness to evil when identifying risky code (MK, SV, HAS), pp. 113–122.
ICSEICSE-2010-AdamsJH #using
Identifying crosscutting concerns using historical code changes (BA, ZMJ, AEH), pp. 305–314.
ICSEICSE-2010-LohK #difference #named
LSdiff: a program differencing tool to identify systematic structural differences (AL, MK), pp. 263–266.
ICSEICSE-2010-WuGAK #approach #evolution #framework #hybrid #named
AURA: a hybrid approach to identify framework evolution (WW, YGG, GA, MK), pp. 325–334.
SACSAC-2010-AhmedLSH #performance
Fast file-type identification (IA, KsL, HS, MH), pp. 1601–1602.
SACSAC-2010-AntonelliRL #domain model
Early identification of crosscutting concerns in the domain model guided by states (LA, GR, JCSdPL), pp. 275–280.
SACSAC-2010-BernalFMD #approach #process #rule-based
Dynamic context-aware business process: a rule-based approach supported by pattern identification (JFMB, PF, MM, JD), pp. 470–474.
SACSAC-2010-LevyLMS #bias #multi
Identification and control of intrinsic bias in a multiscale computational model of drug addiction (YZL, DL, JSM, HTS), pp. 2389–2393.
SACSAC-2010-MillerRPW #using
Personal identification using periocular skin texture (PEM, AWR, SJP, DLW), pp. 1496–1500.
SACSAC-2010-PenimA #modelling
Identifying and modeling aspectual scenarios with theme and MATA (ASP, JA), pp. 287–291.
GPCEGPCE-2010-RysselPK #automation #modelling
Automatic variation-point identification in function-block-based models (UR, JP, KK), pp. 23–32.
SLESLE-2010-HerrmannsdoerferRK #analysis #metamodelling
Metamodel Usage Analysis for Identifying Metamodel Improvements (MH, DR, MK), pp. 62–81.
SLESLE-2010-HostO #canonical #implementation #java #semantics #using
Canonical Method Names for Java — Using Implementation Semantics to Identify Synonymous Verbs (EWH, BMØ), pp. 226–245.
CASECASE-2010-BengtssonTLAYMF #automation #design #sequence #visualisation
Relations identification and visualization for sequence planning and automation design (KB, CT, BL, , CY, SM, PF), pp. 841–848.
DACDAC-2010-WangCW #performance
Fast identification of operating current for toggle MRAM by spiral search (SHW, CYC, CWW), pp. 923–928.
DATEDATE-2010-ChenO #adaptation #effectiveness
Cost-effective IR-drop failure identification and yield recovery through a failure-adaptive test scheme (MC, AO), pp. 63–68.
PDPPDP-2010-LiuYCWZ #towards
Towards Global State Identification of Nodes in DHT Based Systems (DL, GY, FC, HW, PZ), pp. 271–275.
FASEFASE-2010-CortellessaMRT #effectiveness #performance #process
A Process to Effectively Identify “Guilty” Performance Antipatterns (VC, AM, RHR, CT), pp. 368–382.
ICSTICST-2010-KimSGSHN #analysis #automation #debugging
Automated Bug Neighborhood Analysis for Identifying Incomplete Bug Fixes (MK, SS, CG, HS, MJH, MGN), pp. 383–392.
ISSTAISSTA-2010-CarbinR #automation
Automatically identifying critical input regions and code in applications (MC, MCR), pp. 37–48.
CBSECBSE-2009-BirkmeierO #classification #comparison #component #on the #state of the art
On Component Identification Approaches — Classification, State of the Art, and Comparison (DB, SO), pp. 1–18.
DRRDRR-2009-BhardwajCG #image #word
Script identification of handwritten word images (AB, HC, VG), pp. 1–10.
DRRDRR-2009-SrihariRMB
Identification of forgeries in handwritten petitions for ballot propositions (SNS, VR, MM, GRB), pp. 1–10.
DRRDRR-2009-TanVK #clustering #online #using
Online writer identification using alphabetic information clustering (GXT, CVG, ACK), pp. 1–10.
TPDLECDL-2009-MurthyFCHTRF #image #retrieval
Superimposed Image Description and Retrieval for Fish Species Identification (UM, EAF, YC, EH, RdST, EJR, TRCF), pp. 285–296.
ICDARICDAR-2009-ArlandisPU
Identification of Very Similar Filled-in Forms with a Reject Option (JA, JCPC, EU), pp. 246–250.
ICDARICDAR-2009-BenjelilKMA
Arabic and Latin Script Identification in Printed and Handwritten Types Based on Steerable Pyramid Features (MB, SK, RM, AMA), pp. 591–595.
ICDARICDAR-2009-ChandaPFP #approach
Two-stage Approach for Word-wise Script Identification (SC, SP, KF, UP), pp. 926–930.
ICDARICDAR-2009-ChaudhuriB
Handwritten Text Line Identification in Indian Scripts (BBC, SB), pp. 636–640.
ICDARICDAR-2009-FornesLSB #music #on the #using
On the Use of Textural Features for Writer Identification in Old Handwritten Music Scores (AF, JL, GS, HB), pp. 996–1000.
ICDARICDAR-2009-Garain #documentation #image
Identification of Mathematical Expressions in Document Images (UG), pp. 1340–1344.
ICDARICDAR-2009-GarainP #multi #using
Off-Line Multi-Script Writer Identification Using AR Coefficients (UG, TP), pp. 991–995.
ICDARICDAR-2009-LiST #independence #online
Hierarchical Shape Primitive Features for Online Text-independent Writer Identification (BL, ZS, TT), pp. 986–990.
ICDARICDAR-2009-LiT #independence #online #sequence
Online Text-independent Writer Identification Based on Temporal Sequence and Shape Codes (BL, TT), pp. 931–935.
ICDARICDAR-2009-PavelecOJNB #modelling #using
Author Identification Using Compression Models (DP, LSO, EJRJ, FDNN, LVB), pp. 936–940.
ICDARICDAR-2009-PengSGSB #documentation #markov #random
Markov Random Field Based Text Identification from Annotated Machine Printed Documents (XP, SS, VG, RS, KB), pp. 431–435.
ICDARICDAR-2009-ShahabiR #documentation
A New Method for Writer Identification of Handwritten Farsi Documents (FS, MR), pp. 426–430.
ICDARICDAR-2009-TanVK #online
Impact of Alphabet Knowledge on Online Writer Identification (GXT, CVG, ACK), pp. 56–60.
ICDARICDAR-2009-TanVK09a #information retrieval #online
Information Retrieval Model for Online Handwritten Script Identification (GXT, CVG, ACK), pp. 336–340.
ICDARICDAR-2009-WangJW #performance
High Performance Chinese/English Mixed OCR with Character Level Language Identification (KW, JJ, QW), pp. 406–410.
JCDLJCDL-2009-BethardGMS #automation #topic
Topic model methods for automatically identifying out-of-scope resources (SB, SG, JHM, TS), pp. 19–28.
PODSPODS-2009-KirschMPPUV #approach #performance #statistics
An efficient rigorous approach for identifying statistically significant frequent itemsets (AK, MM, AP, GP, EU, FV), pp. 117–126.
EDMEDM-2009-NugentAD #clustering #student
Subspace Clustering of Skill Mastery: Identifying Skills that Separate Students (RN, EA, ND), pp. 101–110.
ITiCSEITiCSE-2009-KiesmullerB #algorithm #automation #problem
Automatically identifying learners’ problem solving strategies in-process solving algorithmic problems (UK, TB), p. 354.
SIGITESIGITE-2009-Ekstrom
Collecting IT scholarship: the need for identification and access (JJE), p. 208.
CSMRCSMR-2009-GarciaPEM #architecture #smell
Identifying Architectural Bad Smells (JG, DP, GE, NM), pp. 255–258.
CSMRCSMR-2009-LuciaDGR #behaviour #parsing #visual notation
Behavioral Pattern Identification through Visual Language Parsing and Code Instrumentation (ADL, VD, CG, MR), pp. 99–108.
CSMRCSMR-2009-Trifu #approach
Improving the Dataflow-Based Concern Identification Approach (MT), pp. 109–118.
CSMRCSMR-2009-TsantalisC #refactoring
Identification of Extract Method Refactoring Opportunities (NT, AC), pp. 119–128.
ICPCICPC-2009-HammadCM #automation #traceability
Automatically identifying changes that impact code-to-design traceability (MH, MLC, JIM), pp. 20–29.
ICSMEICSM-2009-Li #analysis #dependence #using
Identifying high-level dependence structures using slice-based dependence analysis (ZL), pp. 457–460.
SCAMSCAM-2009-BinkleyH #clustering #dependence #scalability
Identifying “Linchpin Vertices” That Cause Large Dependence Clusters (DB, MH), pp. 89–98.
WCREWCRE-1999-BernardiL99a #analysis #named #object-oriented
ConAn: A Tool for the Identification of Crosscutting Concerns in Object Oriented Systems Based on Type Hierarchy Analysis (MLB, GADL), pp. 319–320.
WCREWCRE-1999-LavalDDB99a #dependence #matrix
Identifying Cycle Causes with Enriched Dependency Structural Matrix (JL, SD, SD, AB), pp. 113–122.
WCREWCRE-1999-TangHZ99a
Techniques for Identifying the Country Origin of Mailing List Participants (RT, AEH, YZ), pp. 36–40.
ICFPICFP-2009-GenevesLQ #evolution #query #xml
Identifying query incompatibilities with evolving XML schemas (PG, NL, VQ), pp. 221–230.
DiGRADiGRA-2009-PaulP
The Rise and Fall of CTS: Kenneth Burke Identifying with the World of Warcraft (CAP, JSP).
HCIHCI-AUII-2009-Heimgartner #interactive
Identification of the User by Analyzing Human Computer Interaction (RH), pp. 275–283.
HCIHCI-NIMT-2009-BravoHFVCNFCPV #interactive #towards
From Implicit to Touching Interaction by Identification Technologies: Towards Tagging Context (JB, RH, CF, VV, GC, SWN, JF, GC, RP, MV), pp. 417–425.
HCIHIMI-DIE-2009-OkaOMS #case study #people
A Study on Color Conversion for Color Deficient People to Identify Color (MO, NO, HM, AS), pp. 594–600.
HCIHIMI-II-2009-MacedoI #standard
Patient Standardization Identification as a Healthcare Issue (MM, PTI), pp. 566–575.
HCIHIMI-II-2009-SawaragiIHN #approach #using
Identifying Latent Similarities among Near-Miss Incident Records Using a Text-Mining Method and a Scenario-Based Approach (TS, KI, YH, HN), pp. 594–603.
HCIIDGD-2009-AlostathAA #design #difference #interface
Identifying and Measuring Cultural Differences in Cross-Cultural User-Interface Design (JMA, SA, ABA), pp. 3–12.
ICEISICEIS-SAIC-2009-DronavajjalaNS #analysis #enterprise #process #project management #relational
Identification of Critical Success Factors to ERP Project Management — An Application of Grey Relational Analysis and Analytic Hierarchy Process (CSD, SN, RS), pp. 187–192.
CIKMCIKM-2009-DewriRRW #named
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice (RD, IR, IR, DW), pp. 1037–1046.
CIKMCIKM-2009-JainP #web
Identifying comparable entities on the web (AJ, PP), pp. 1661–1664.
CIKMCIKM-2009-LinEF #web
Identifying interesting assertions from the web (TL, OE, JF), pp. 1787–1790.
CIKMCIKM-2009-ZhuM #analysis #multi
Multidimensional political spectrum identification and analysis (LZ, PM), pp. 2045–2048.
ICMLICML-2009-MaSSV #learning #online #scalability
Identifying suspicious URLs: an application of large-scale online learning (JM, LKS, SS, GMV), pp. 681–688.
KDDKDD-2009-TantipathananandhB #algorithm #approximate #community
Constant-factor approximation algorithms for identifying dynamic communities (CT, TYBW), pp. 827–836.
KEODKEOD-2009-OliveiraTO #image
Identifying the Cardiac Region in Images of Electrical Impedance Tomography through Wavelet Transform (JPdO, HT, NRSO), pp. 380–383.
SIGIRSIGIR-2009-ShaparenkoJ #documentation #modelling
Identifying the original contribution of a document via language modeling (BS, TJ), pp. 696–697.
SIGIRSIGIR-2009-YangGH #information retrieval #problem
Protein identification as an information retrieval problem (YY, SG, AH), pp. 752–753.
REFSQREFSQ-2009-TunYLN #approach #interactive #problem
Early Identification of Problem Interactions: A Tool-Supported Approach (TTT, YY, RCL, BN), pp. 74–88.
SACSAC-2009-BreauxLOA #requirements #using
Identifying vulnerabilities and critical requirements using criminal court proceedings (TDB, JDL, PNO, AIA), pp. 355–359.
SACSAC-2009-FloraTB #forensics #image #using
Forensic bite mark identification using image processing methods (GF, MT, HB), pp. 903–907.
SACSAC-2009-LiuMZ #approach #dependence #evolution
An approach to identifying conversation dependency in service oriented system during dynamic evolution (ML, DM, YZ), pp. 1072–1073.
SACSAC-2009-MacielPRG #web
Identifying discourse mistakes in web debates: moderation in the DCC (CM, VCP, LR, ACBG), pp. 690–691.
SACSAC-2009-RekapalliHZ #named #scalability
HSP-HMMER: a tool for protein domain identification on a large scale (BR, CH, IBZ), pp. 766–770.
SACSAC-2009-SinghB #multi #web
Information-theoretic identification of content pages for analyzing user information needs and actions on the multimedia web (RS, BDB), pp. 1806–1810.
CASECASE-2009-SuCFTJKL #approach #information management #novel #ontology
A novel ontology-based knowledge engineering approach for yield symptom identification in semiconductor manufacturing (FHS, SCC, CMF, YJT, JJ, CPK, CYL), pp. 433–438.
DACDAC-2009-YuanX #on the #pseudo #testing
On systematic illegal state identification for pseudo-functional testing (FY, QX), pp. 702–707.
DATEDATE-2009-KorhonenK
A loopback-based INL test method for D/A and A/D converters employing a stimulus identification technique (EK, JK), pp. 1650–1655.
DATEDATE-2009-MonyBMB #scalability
Speculative reduction-based scalable redundancy identification (HM, JB, AM, RKB), pp. 1674–1679.
ISMMISMM-2009-MarronKH
Identification of logically related heap regions (MM, DK, MVH), pp. 89–98.
ICSTICST-2009-HalfondCO #testing
Penetration Testing with Improved Input Vector Identification (WGJH, SRC, AO), pp. 346–355.
ICSTICST-2009-HeckmanW #process #static analysis
A Model Building Process for Identifying Actionable Static Analysis Alerts (SSH, LAW), pp. 161–170.
ISSTAISSTA-2009-ChengLZWY #debugging #graph #mining #using
Identifying bug signatures using discriminative graph mining (HC, DL, YZ, XW, XY), pp. 141–152.
ISSTAISSTA-2009-ClauseO #automation #named #using
Penumbra: automatically identifying failure-relevant inputs using dynamic tainting (JAC, AO), pp. 249–260.
ISSTAISSTA-2009-GorgZ #aspectj #difference #semantics #source code
Identifying semantic differences in AspectJ programs (MTG, JZ), pp. 25–36.
ISSTAISSTA-2009-HalfondAO #analysis #interface #precise #testing #web
Precise interface identification to improve testing and analysis of web applications (WGJH, SA, AO), pp. 285–296.
CBSECBSE-2008-AlbaniOB #component #towards
Towards a Systematic Method for Identifying Business Components (AA, SO, DB), pp. 262–277.
WICSAWICSA-2008-AllouiCV #architecture #component #towards
Towards Software Architecture Physiology: Identifying Vital Components (IA, SC, HV), pp. 293–296.
DocEngDocEng-2008-AdamDS #web
Identifying and expanding titles in web texts (CA, ED, PSD), pp. 213–216.
DocEngDocEng-2008-ValleCP #documentation #performance #using #visual notation
Fast identification of visual documents using local descriptors (EV, MC, SPF), pp. 173–176.
DRRDRR-2008-BrinkKS #automation #verification
Automatic removal of crossed-out handwritten text and the effect on writer verification and identification (AB, HvdK, LS), p. 68150.
DRRDRR-2008-ChanVT #online #prototype #using
Online writer identification using character prototypes distributions (SKC, CVG, YHT), p. 68150.
DRRDRR-2008-DolegaAA
Stroke frequency descriptors for handwriting-based writer identification (BD, GA, SA), p. 68150.
DRRDRR-2008-KimLT #approach #hybrid #statistics
Hybrid approach combining contextual and statistical information for identifying MEDLINE citation terms (ICK, DXL, GRT), p. 68150.
TPDLECDL-2008-Ernst-GerlachC
Identifying Quotations in Reference Works and Primary Materials (AEG, GRC), pp. 78–87.
TPDLECDL-2008-TaniguchiN
Identification of Bibliographic Information Written in Both Japanese and English (YT, HN), pp. 431–433.
JCDLJCDL-2008-BogenJKFS
Application of kalman filters to identify unexpected change in blogs (PLBI, JJ, UK, RF, FMSI), pp. 305–312.
JCDLJCDL-2008-OyamaST #web
Identification of time-varying objects on the web (SO, KS, KT), pp. 285–294.
VLDBVLDB-2008-BaykanHW #web
Web page language identification based on URLs (EB, MRH, IW), pp. 176–187.
VLDBVLDB-2008-DDH #diagrams #reduction #robust
Identifying robust plans through plan diagram reduction (HD, PND, JRH), pp. 1124–1140.
VLDBVLDB-2008-HayMJTW #network #social
Resisting structural re-identification in anonymized social networks (MH, GM, DJ, DFT, PW), pp. 102–114.
VLDBVLDB-2008-LiuC #keyword #reasoning #xml
Reasoning and identifying relevant matches for XML keyword search (ZL, YC), pp. 921–932.
SIGITESIGITE-2008-Edirisinghe #education #fault #game studies #programming #student #using
Teaching students to identify common programming errors using a game (EMNSE), pp. 95–98.
SIGITESIGITE-2008-Rubino #authentication
An open system for transparent firewall authentication and user traffic identification within corporate intranets (RDR), pp. 113–118.
CSMRCSMR-2008-Trifu #data flow #object-oriented #using
Using Dataflow Information for Concern Identification in Object-Oriented Software Systems (MT), pp. 193–202.
CSMRCSMR-2008-TsantalisCC #named #smell
JDeodorant: Identification and Removal of Type-Checking Bad Smells (NT, TC, AC), pp. 329–331.
ICPCICPC-2008-ComanS #automation #development
Automated Identification of Tasks in Development Sessions (IDC, AS), pp. 212–217.
ICPCICPC-2008-DongG #architecture #object-oriented
Identifying Architectural Change Patterns in Object-Oriented Systems (XD, MWG), pp. 33–42.
ICPCICPC-2008-SridharaHPV #case study #comparative #semantics #similarity #tool support #word
Identifying Word Relations in Software: A Comparative Study of Semantic Similarity Tools (GS, EH, LLP, KVS), pp. 123–132.
ICSMEICSM-2008-JeffreyGG #debugging #memory management #using
Identifying the root causes of memory bugs using corrupted memory location suppression (DJ, NG, RG), pp. 356–365.
ICSMEICSM-2008-JiangHHF #automation #problem #testing
Automatic identification of load testing problems (ZMJ, AEH, GH, PF), pp. 307–316.
ICSMEICSM-2008-SuttonM #automation #c++ #concept
Automatically identifying C++0x concepts in function templates (AS, JIM), pp. 57–66.
MSRMSR-2008-AlonsoDG #cvs #visualisation
Expertise identification and visualization from CVS (OA, PTD, MG), pp. 125–128.
PASTEPASTE-2008-ZhangLGZ #approach #effectiveness #hybrid
Effective identification of failure-inducing changes: a hybrid approach (SZ, YL, ZG, JZ), pp. 77–83.
CHICHI-2008-MiaskiewiczSK #analysis #semantics
A latent semantic analysis methodology for the identification and creation of personas (TM, TS, KAK), pp. 1501–1510.
ICEISICEIS-J-2008-BoglSPW08a #automation #modelling #semantics
Semantic Annotation of EPC Models in Engineering Domains to Facilitate an Automated Identification of Common Modelling Practices (AB, MS, GP, NW), pp. 155–171.
CIKMCIKM-2008-ChalamallaNSR
Identification of class specific discourse patterns (AC, SN, LVS, GR), pp. 1193–1202.
CIKMCIKM-2008-LiuMG #bound #detection #documentation
Identifying table boundaries in digital documents via sparse line detection (YL, PM, CLG), pp. 1311–1320.
CIKMCIKM-2008-MahouiTSC #modelling #predict #using
Identification of gene function using prediction by partial matching (PPM) language models (MM, WJT, AKTS, SC), pp. 779–786.
ECIRECIR-2008-OfoghiYM #natural language #semantics
The Impact of Semantic Class Identification and Semantic Role Labeling on Natural Language Answer Extraction (BO, JY, LM), pp. 430–437.
ICPRICPR-2008-BrasnettB #image #performance #robust
Fast and robust image identification (PB, MB), pp. 1–5.
ICPRICPR-2008-ChenSXS #algorithm #search-based #using
Computer graphics identification using genetic algorithm (WC, YQS, GX, WS), pp. 1–4.
ICPRICPR-2008-GesuBF
Intruders pattern identification (VDG, GLB, JHF), pp. 1–4.
ICPRICPR-2008-HossainMJY #adaptation #invariant #using
Clothes-invariant gait identification using part-based adaptive weight control (MAH, YM, WJ, YY), pp. 1–4.
ICPRICPR-2008-LiT #image
Script identification of camera-based images (LL, CLT), pp. 1–4.
ICPRICPR-2008-MerchanOS #image
Identification and pose under severe occlusion in range images (PM, AAO, SS), pp. 1–4.
KDDKDD-2008-BhattacharyaGJ #categorisation #documentation
Structured entity identification and document categorization: two tasks with one joint model (IB, SG, SJ), pp. 25–33.
KDDKDD-2008-BouguessaDW #exclamation
Identifying authoritative actors in question-answering forums: the case of Yahoo! answers (MB, BD, SW), pp. 866–874.
KDDKDD-2008-ChoRC #data mining #mining #network
Reconstructing chemical reaction networks: data mining meets system identification (YJC, NR, YC), pp. 142–150.
KDDKDD-2008-FujiwaraSY #markov #modelling #named #performance
SPIRAL: efficient and exact model identification for hidden Markov models (YF, YS, MY), pp. 247–255.
KDDKDD-2008-JensenFTM #automation #design
Automatic identification of quasi-experimental designs for discovering causal knowledge (DDJ, ASF, BJT, MEM), pp. 372–380.
KDDKDD-2008-Sindhgatta #developer #source code
Identifying domain expertise of developers from source code (RS), pp. 981–989.
KDDKDD-2008-ZhaoWLYC #data flow #multi #semistructured data
Identifying biologically relevant genes via multiple heterogeneous data sources (ZZ, JW, HL, JY, YC), pp. 839–847.
KRKR-2008-CalvaneseGLLR #constraints #logic
Path-Based Identification Constraints in Description Logics (DC, GDG, DL, ML, RR), pp. 231–241.
KRKR-2008-TomanW #logic
Identifying Objects Over Time with Description Logics (DT, GEW), pp. 724–732.
SEKESEKE-2008-BalushiSPCL #ontology #quality #using
Identifying NFRs Conflicts Using Quality Ontology (THAB, PRFS, MP, ÓC, PL), pp. 929–934.
SEKESEKE-2008-JanesSS #process
Non-invasive Software Process Data Collection for Expert Identification (AJ, AS, GS), pp. 191–196.
SIGIRSIGIR-2008-WelchC #automation #query
Automatically identifying localizable queries (MJW, JC), pp. 507–514.
MODELSMoDELS-2008-StalhaneS #case study #comparison #diagrams #safety
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams (TS, GS), pp. 721–735.
SPLCSPLC-2008-KumarBC #variability
Identifying and Exploiting the Similarities between Rationale Management and Variability Management (AKT, BB, OC), pp. 99–108.
MODELSMoDELS-2008-StalhaneS #case study #comparison #diagrams #safety
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams (TS, GS), pp. 721–735.
REFSQREFSQ-2008-WelshS #adaptation #problem
When to Adapt? Identification of Problem Domains for Adaptive Systems (KW, PS), pp. 198–203.
ASEASE-2008-HsuJO #agile #debugging #named #process
Rapid: Identifying Bug Signatures to Support Debugging Activities (HYH, JAJ, AO), pp. 439–442.
FSEFSE-2008-HalfondO #automation #parametricity #web
Automated identification of parameter mismatches in web applications (WGJH, AO), pp. 181–191.
SACSAC-2008-AhamedRH #architecture #distributed #scalability #using
Secured tag identification using EDSA (enhanced distributed scalable architecture) (SIA, FR, MEH), pp. 1902–1907.
SACSAC-2008-BesshoKKS #framework #ubiquitous
A space-identifying ubiquitous infrastructure and its application for tour-guiding service (MB, SK, NK, KS), pp. 1616–1621.
SACSAC-2008-CarvalhoLGS #programming #search-based #using
Replica identification using genetic programming (MGdC, AHFL, MAG, ASdS), pp. 1801–1806.
SACSAC-2008-PavelecJBO #independence #using
Author identification using writer-dependent and writer-independent strategies (DP, EJRJ, LVB, LSO), pp. 414–418.
SACSAC-2008-StrapparavaM #learning
Learning to identify emotions in text (CS, RM), pp. 1556–1560.
SACSAC-2008-WeiSWS #email #forensics #mining
Mining spam email to identify common origins for forensic application (CW, AS, GW, AS), pp. 1433–1437.
CASECASE-2008-Andoh #using
Coulomb friction identification for mechatronic servo systems with limited strokes using two reference inputs (FA), pp. 265–272.
CASECASE-2008-HanX #multi #network #using
Nonlinear systems identification using dynamic multi-time scales neural networks (XH, WFX), pp. 448–453.
CASECASE-2008-SchroederMT #health #monitoring #process
A Factory Health Monitor: System identification, process monitoring, and control (KS, JRM, DMT), pp. 16–22.
CASECASE-2008-SunWHRW #case study #effectiveness #monitoring #set
Identification of feature set for effective tool condition monitoring — a case study in titanium machining (JS, YSW, GSH, MR, ZW), pp. 273–278.
DACDAC-2008-HamersE #automation #independence
Automated hardware-independent scenario identification (JH, LE), pp. 954–959.
DACDAC-2008-HoTDDGS #logic #verification
Early formal verification of conditional coverage points to identify intrinsically hard-to-verify logic (RCH, MT, MMD, ROD, JG, DES), pp. 268–271.
DATEDATE-2008-KoN #automation #validation
Automated Trace Signals Identification and State Restoration for Improving Observability in Post-Silicon Validation (HFK, NN), pp. 1298–1303.
DATEDATE-2008-LaiHK #multi #verification
Improving Constant-Coefficient Multiplier Verification by Partial Product Identification (CYL, CYH, KYK), pp. 813–818.
ICSTICST-2008-TravisonS #automation #pattern matching
Test Instrumentation and Pattern Matching for Automatic Failure Identification (DT, GS), pp. 377–386.
ISSTAISSTA-2008-EdwardsTWVD #automation #fault #named
AFID: an automated fault identification tool (AE, ST, SW, RV, BD), pp. 179–188.
DRRDRR-2007-KimLT #documentation #online #using
Identification of comment-on sentences in online biomedical documents using support vector machines (ICK, DXL, GRT).
TPDLECDL-2007-BabeuBCKW
Named Entity Identification and Cyberinfrastructure (AB, DB, GRC, RK, GW), pp. 259–270.
TPDLECDL-2007-MiottoO #automation #music
Automatic Identification of Music Works Through Audio Matching (RM, NO), pp. 124–135.
HTHT-2007-ChinC #hypermedia #social #using
Identifying subcommunities using cohesive subgroups in social hypertext (AC, MHC), pp. 175–178.
ICDARICDAR-2007-BrinkSB #towards #using #verification
Towards Explainable Writer Verification and Identification Using Vantage Writers (AB, LS, MB), pp. 824–828.
ICDARICDAR-2007-BulacuSB #independence #verification
Text-Independent Writer Identification and Verification on Offline Arabic Handwriting (MB, LS, AB), pp. 769–773.
ICDARICDAR-2007-ChandaTP
SVM Based Scheme for Thai and English Script Identification (SC, ORT, UP), pp. 551–555.
ICDARICDAR-2007-DasariB #using
Identification of Non-Black Inks Using HSV Colour Space (HD, CB), pp. 486–490.
ICDARICDAR-2007-GazzahA #analysis #using
Arabic Handwriting Texture Analysis for Writer Identification Using the DWT-Lifting Scheme (SG, NEBA), pp. 1133–1137.
ICDARICDAR-2007-ImdadBERE #using
Writer Identification Using Steered Hermite Features and SVM (AI, SB, VE, CRM, HE), pp. 839–843.
ICDARICDAR-2007-LuLT #categorisation
Identification of Latin-Based Languages through Character Stroke Categorization (SJL, LL, CLT), pp. 352–356.
ICDARICDAR-2007-NejadR #verification
A New Method for Writer Identification and Verification Based on Farsi/Arabic Handwritten Texts (FN, MR), pp. 829–833.
ICDARICDAR-2007-SchlapbachB #online
Fusing Asynchronous Feature Streams for On-line Writer Identification (AS, HB), pp. 103–107.
ICDARICDAR-2007-Schomaker07a #roadmap #verification
Advances in Writer Identification and Verification (LS), pp. 1268–1273.
ICDARICDAR-2007-SiddiqiV #documentation
Writer Identification in Handwritten Documents (IS, NV), pp. 108–112.
ICDARICDAR-2007-ValleCP #database #image
Matching Local Descriptors for Image Identification on Cultural Databases (EV, MC, SPF), pp. 679–683.
ICDARICDAR-2007-VikramG #documentation #modelling
Appearance Based Models in Document Script Identification (TNV, DSG), pp. 709–713.
JCDLJCDL-2007-CunninghamM #library
Identifying personal photo digital library features (SJC, MM), pp. 400–401.
PODSPODS-2007-ChakaravarthyPRAM #algorithm #approximate
Decision trees for entity identification: approximation algorithms and hardness results (VTC, VP, SR, PA, MKM), pp. 53–62.
SIGMODSIGMOD-2007-LiuC #keyword #xml
Identifying meaningful return information for XML keyword search (ZL, YC), pp. 329–340.
WCREWCRE-J-2005-KuhnDG07 #clustering #semantics #source code #topic
Semantic clustering: Identifying topics in source code (AK, SD, TG), pp. 230–243.
ICPCICPC-2007-CareyG #automation #concept #source code
Recovering Concepts from Source Code with Automated Concept Identification (MMC, GCG), pp. 27–36.
ICPCICPC-2007-Vivanco #algorithm #complexity #metric #modelling #predict #search-based #source code #using
Use of a Genetic Algorithm to Identify Source Code Metrics Which Improves Cognitive Complexity Predictive Models (RAV), pp. 297–300.
ICSMEICSM-2007-FokaefsTC #named #smell
JDeodorant: Identification and Removal of Feature Envy Bad Smells (MF, NT, AC), pp. 519–520.
MSRMSR-2007-CanforaCP #repository #source code
Identifying Changed Source Code Lines from Version Repositories (GC, LC, MDP), p. 14.
WCREWCRE-2007-RaberL07a #approach #automation #named #obfuscation
Deobfuscator: An Automated Approach to the Identification and Removal of Code Obfuscation (JR, EL), pp. 275–276.
CHICHI-2007-WhiteMF #automation #design #mobile #user interface
Designing a mobile user interface for automated species identification (SW, DM, SF), pp. 291–294.
HCIDHM-2007-LiLZ #algorithm #approach #modelling #multi #robust
A Robust Algorithm for a System Identification Approach to Digital Human Modeling: An Application to Multi-fingered Hand Movement (KL, SWL, XZ), pp. 157–160.
HCIDHM-2007-LuoYZ
A Method for Gene Identification by Dynamic Feature Choosing (JL, LY, XZ), pp. 678–683.
HCIHCI-AS-2007-HayakawaUSAK #design #developer #process #web
Report on Project to Identify Excellent Local Government Web Sites An Attempt to Educate Web Systems Developers on the Importance of Human-Centered Design Processes (SH, HU, TS, NA, YK), pp. 899–905.
HCIHCI-IDU-2007-EschenbrennerN #information management #what
What Makes Them So Special?: Identifying Attributes of Highly Competent Information System Users (BE, FFHN), pp. 736–745.
HCIHCI-MIE-2007-ZhongCZL #adaptation #incremental #online
Confidence Measure Based Incremental Adaptation for Online Language Identification (SZ, YC, CZ, JL), pp. 535–543.
HCIHIMI-MTT-2007-KieliszewskiCBLH #analysis #visualisation
A Visualization Solution for the Analysis and Identification of Workforce Expertise (CAK, JC, AB, AL, TH), pp. 317–326.
HCIOCSC-2007-SchimkeSZ #community #online #social
The Relationship Between Social Presence and Group Identification Within Online Communities and Its Impact on the Success of Online Communities (DS, HS, AZ), pp. 160–168.
CAiSECAiSE-2007-PachecoT #quality #requirements
Stakeholder Identification as an Issue in the Improvement of Software Requirements Quality (CP, ET), pp. 370–380.
ICEISICEIS-AIDSS-2007-Rodriguez-EliasMFVS #analysis #approach #design #information management
Knowledge Flow Analysis to Identify Knowledge Needs for the Design of Knowledge Management Systems and Strategies — A Methodological Approach (OMRE, AIMG, JF, AV, JPS), pp. 492–497.
ICEISICEIS-DISI-2007-NguyenT #constraints #ontology #web
Integrating identification constraints in web ontology (TDTN, NLT), pp. 338–343.
ICEISICEIS-EIS-2007-ValenteS #case study #process
Process Use Cases: Use Cases Identification (PV, PNMS), pp. 301–307.
CIKMCIKM-2007-GoldsteinCC #summary
Genre identification and goal-focused summarization (JG, GMC, JGC), pp. 889–892.
CIKMCIKM-2007-RosenfeldF #clustering
Clustering for unsupervised relation identification (BR, RF), pp. 411–418.
CIKMCIKM-2007-SongCHT
Identifying opinion leaders in the blogosphere (XS, YC, KH, BLT), pp. 971–974.
KDDKDD-2007-FriedlandJ
Finding tribes: identifying close-knit individuals from employment patterns (LF, DJ), pp. 290–299.
KDDKDD-2007-TantipathananandhBK #community #framework #network #social
A framework for community identification in dynamic social networks (CT, TYBW, DK), pp. 717–726.
MLDMMLDM-2007-CoenenLSW #classification #statistics
Statistical Identification of Key Phrases for Text Classification (FC, PHL, RS, YJW), pp. 838–853.
MLDMMLDM-2007-SilvaGF
One Lead ECG Based Personal Identification with Feature Subspace Ensembles (HS, HG, ALNF), pp. 770–783.
RecSysRecSys-2007-AngladeTV #clustering
Complex-network theoretic clustering for identifying groups of similar listeners in p2p systems (AA, MT, FV), pp. 41–48.
SASSAS-2007-WeiMZC #algorithm #decompiler
A New Algorithm for Identifying Loops in Decompilation (TW, JM, WZ, YC), pp. 170–183.
RERE-2007-Kof #named
Scenarios: Identifying Missing Objects and Actions by Means of Computational Linguistics (LK), pp. 121–130.
ASEASE-2007-Gawley #automation #feature model #modelling #variability
Automating the identification of variability realisation techniques from feature models (RG), pp. 555–558.
ESEC-FSEESEC-FSE-2007-SherriffHLW #static analysis #using
Using groupings of static analysis alerts to identify files likely to contain field failures (MS, SSH, JML, LAW), pp. 565–568.
ICSEICSE-2007-KojarskiL #aspect-oriented #feature model #framework #interactive #multi
Identifying Feature Interactions in Multi-Language Aspect-Oriented Frameworks (SK, DHL), pp. 147–157.
CASECASE-2007-Andoh
Inertia Identification of Mechatronic Servo Systems with Infinitesimal Motions (FA), pp. 925–932.
CASECASE-2007-DotoliFM #monitoring #on the #petri net #specification
On Line Identification of Discrete Event Systems via Petri Nets: an Application to Monitor Specification (MD, MPF, AMM), pp. 893–898.
CASECASE-2007-LaaksoHKF #automation #open source
Open-Source Demo System to Support Automated Identification and Tracking Workshops (ML, JH, RK, KF), pp. 1008–1013.
CASECASE-2007-NaZW #process
Discrete-Model Identification for Nonlinear Laser Welding Process (XN, YZ, BW), pp. 1002–1007.
CASECASE-2007-YangZL #modelling #performance
Modeling and Identification for High-Speed Milling Machines (JY, DZ, ZL), pp. 346–351.
CASECASE-2007-YeMY #2d #metric
Information Measures for Biometric Identification via 2D Discrete Wavelet Transform (ZY, HM, YY), pp. 835–840.
DATEDATE-2007-FerrignoPSL #design #process
Identification of process/design issues during 0.18 µm technology qualification for space application (JF, PP, KS, DL), pp. 989–993.
ISSTAISSTA-2007-OstrandWB #algorithm #automation
Automating algorithms for the identification of fault-prone files (TJO, EJW, RMB), pp. 219–227.
TPDLECDL-2006-Tolosana-CalasanzALNMZ #metadata #on the #problem #quality
On the Problem of Identifying the Quality of Geographic Metadata (RTC, JAÁR, JL, JNI, PRMM, FJZS), pp. 232–243.
HTHT-2006-Delort #documentation #using
Identifying commented passages of documents using implicit hyperlinks (JYD), pp. 89–98.
SIGMODSIGMOD-2006-DuanB #performance #problem
Proactive identification of performance problems (SD, SB), pp. 766–768.
ITiCSEITiCSE-2006-ThomassonRT #design #object-oriented
Identifying novice difficulties in object oriented design (BJT, MR, LT), pp. 28–32.
CSMRCSMR-2006-KaczorGH #algorithm #design pattern #performance
Efficient Identification of Design Patterns with Bit-vector Algorithm (OK, YGG, SH), pp. 175–184.
ICPCICPC-2006-Marinescu #assessment #design #enterprise #quality
Identification of Design Roles for the Assessment of Design Quality in Enterprise Applications (CM), pp. 169–180.
ICPCICPC-2006-PoshyvanykMRGA #probability #ranking #semantics
Combining Probabilistic Ranking and Latent Semantic Indexing for Feature Identification (DP, AM, VR, YGG, GA), pp. 137–148.
ICSMEICSM-2006-CanforaCP #co-evolution #on the #using
On the Use of Line Co-change for Identifying Crosscutting Concern Code (GC, LC, MDP), pp. 213–222.
MSRMSR-2006-KakimotoMKTTM #using
Using software birthmarks to identify similar classes and major functionalities (TK, AM, YK, HT, MT, KiM), pp. 171–172.
CoGCIG-2006-GordonR #game studies #set #using
Trappy Minimax - using Iterative Deepening to Identify and Set Traps in Two-Player Games (VSG, AR), pp. 205–210.
CSCWCSCW-2006-CataldoWHC #collaboration #coordination #design #requirements #tool support
Identification of coordination requirements: implications for the Design of collaboration and awareness tools (MC, PW, JDH, KMC), pp. 353–362.
ICEISICEIS-AIDSS-2006-RokachRM #automation #concept
Automatic Identification of Negated Concepts in Narrative Clinical Reports (LR, RR, OM), pp. 257–262.
CIKMCIKM-2006-HuZZ #array #clustering #integration #mining
Integration of cluster ensemble and EM based text mining for microarray gene cluster identification and annotation (XH, XZ, XZ), pp. 824–825.
CIKMCIKM-2006-LuPLA #feature model #machine learning #query
Coupling feature selection and machine learning methods for navigational query identification (YL, FP, XL, NA), pp. 682–689.
ECIRECIR-2006-ParaparB #retrieval #topic
Sentence Retrieval with LSI and Topic Identification (DP, AB), pp. 119–130.
ICMLICML-2006-ZhengJLNA #debugging #multi #statistics
Statistical debugging: simultaneous identification of multiple bugs (AXZ, MIJ, BL, MN, AA), pp. 1105–1112.
ICPRICPR-v1-2006-IshidaTIMM #generative #learning
Identification of degraded traffic sign symbols by a generative learning method (HI, TT, II, YM, HM), pp. 531–534.
ICPRICPR-v1-2006-YipW
Identifying centers of circulating and spiraling flow patterns (CLY, KYW), pp. 769–772.
ICPRICPR-v2-2006-ChoL #clustering #image #novel
A novel Virus Infection Clustering for Flower Images Identification (SYC, PTL), pp. 1038–1041.
ICPRICPR-v2-2006-DhandraNHHM #documentation #image #re-engineering
Script Identification Based on Morphological Reconstruction in Document Images (BVD, PN, MH, RH, VSM), pp. 950–953.
ICPRICPR-v2-2006-FarooqSG #documentation
Identifying Handwritten Text in Mixed Documents (FF, KS, VG), pp. 1142–1145.
ICPRICPR-v2-2006-LimCG #using
Scene Identification using Discriminative Patterns (JHL, JPC, SG), pp. 642–645.
ICPRICPR-v2-2006-MakiharaSMEY #adaptation
Adaptation to Walking Direction Changes for Gait Identification (YM, RS, YM, TE, YY), pp. 96–99.
ICPRICPR-v3-2006-Eidenberger #image #robust
Kalman Filtering for Robust Identification of Face Images with Varying Expressions and Lighting Conditions (HE), pp. 1073–1076.
ICPRICPR-v3-2006-IsukapalliE #learning #policy
Learning Policies for Efficiently Identifying Objects of Many Classes (RI, AME, RG), pp. 356–361.
ICPRICPR-v3-2006-LamL #using
Human Identification by Using the Motion and Static Characteristic of Gait (THWL, RSTL), pp. 996–999.
ICPRICPR-v3-2006-SchlapbachB #modelling #using
Off-lineWriter Identification Using Gaussian Mixture Models (AS, HB), pp. 992–995.
ICPRICPR-v3-2006-WangGZLZ #using
Palmprint Identification using Boosting Local Binary Pattern (XW, HG, HZ, BL, ZZ), pp. 503–506.
ICPRICPR-v4-2006-LiL06a #using
Hierarchical Identification of Palmprint using Line-based Hough Transform (FL, MKHL), pp. 149–152.
ICPRICPR-v4-2006-LiWD #retrieval
An Off-line Chinese Writer Retrieval System Based on Text-sensitive Writer Identification (XL, XW, XD), pp. 517–520.
ICPRICPR-v4-2006-NilssonRCJ
Biometric Identification of Mice (KN, TSR, JC, CJ), pp. 465–468.
ICPRICPR-v4-2006-ProencaA #image #normalisation
A Method for the Identification of Noisy Regions in Normalized Iris Images (HP, LAA), pp. 405–408.
ICPRICPR-v4-2006-SunY #3d #evaluation #feature model
Evaluation of 3D Facial Feature Selection for Individual Facial Model Identification (YS, LY), pp. 562–565.
ICPRICPR-v4-2006-WangAC #multi #recognition #using
Multi-lingual Phoneme Recognition and Language Identification Using Phonotactic Information (LW, EA, EHCC), pp. 245–248.
ICPRICPR-v4-2006-WongYL #predict
Identifying Weather Systems from Numerical Weather Prediction Data (KYW, CLY, PWL), pp. 841–844.
ICPRICPR-v4-2006-WuQ #geometry #using
A Hierarchical Palmprint Identification Method Using Hand Geometry and Grayscale Distribution Features (JW, ZQ), pp. 409–412.
ICPRICPR-v4-2006-XieLYD #robust
Improved Two-stage Wiener Filter for Robust Speaker Identification (YX, ML, ZY, BD), pp. 310–313.
ICPRICPR-v4-2006-YamadaKNT #behaviour
Hipprint Person Identification and Behavior Analys (MY, MK, HN, JT), pp. 533–536.
ICPRICPR-v4-2006-YaoLYZL #algorithm #analysis
Analysis and Improvement of An Iris Identification Algorithm (PY, JL, XY, ZZ, BL), pp. 362–365.
ICPRICPR-v4-2006-YaoZDLX #correlation #matrix #modelling
Directly Modeling of Correlation Matrices for GMM in Speaker Identification (ZY, XZ, BD, ML, YX), pp. 306–309.
ICPRICPR-v4-2006-YinAC
Combining Cepstral and Prosodic Features in Language Identification (BY, EA, FC), pp. 254–257.
KDDKDD-2006-AgichteinZ #behaviour #mining #web
Identifying “best bet” web search results by mining past user behavior (EA, ZZ), pp. 902–908.
KDDKDD-2006-ZhangCWZ #clustering #concept
Identifying bridging rules between conceptual clusters (SZ, FC, XW, CZ), pp. 815–820.
KDDKDD-2006-ZhaoLBX #data mining #mining
Opportunity map: identifying causes of failure — a deployed data mining system (KZ, BL, JB, WX), pp. 892–901.
SIGIRSIGIR-2006-JindalL #comparative #documentation
Identifying comparative sentences in text documents (NJ, BL), pp. 244–251.
SIGIRSIGIR-2006-ShenCST #automation #database #music #performance #scalability #towards
Towards efficient automated singer identification in large music databases (JS, BC, JS, KLT), pp. 59–66.
MODELSMoDELS-2006-HogganvikS #approach #empirical #motivation #risk management #visual notation
A Graphical Approach to Risk Identification, Motivated by Empirical Investigations (IH, KS), pp. 574–588.
MODELSMoDELS-2006-HogganvikS #approach #empirical #motivation #risk management #visual notation
A Graphical Approach to Risk Identification, Motivated by Empirical Investigations (IH, KS), pp. 574–588.
SASSAS-2006-HuangCS #debugging
Catching and Identifying Bugs in Register Allocation (YH, BRC, MLS), pp. 281–300.
RERE-2006-ChantreeNRW #natural language #requirements
Identifying Nocuous Ambiguities in Natural Language Requirements (FC, BN, ANDR, AW), pp. 56–65.
RERE-2006-ChenZZM #analysis #dependence #requirements
Identification of Crosscutting Requirements Based on Feature Dependency Analysis (KC, HZ, WZ, HM), pp. 300–303.
ASEASE-2006-KimZPW #automation
Automatic Identification of Bug-Introducing Changes (SK, TZ, KP, EJWJ), pp. 81–90.
ASEASE-2006-WeissgerberD #refactoring #source code
Identifying Refactorings from Source-Code Changes (PW, SD), pp. 231–240.
ICSEICSE-2006-FrantzeskouSGK #effectiveness #source code #using
Effective identification of source code authors using byte-level information (GF, ES, SG, SKK), pp. 893–896.
ICSEICSE-2006-Grunske #architecture #design #multi #optimisation
Identifying “good” architectural design alternatives with multi-objective optimization strategies (LG), pp. 849–852.
SACSAC-2006-ArtemenkoMSW #documentation #evaluation #multi
Evaluation of a language identification system for mono- and multilingual text documents (OA, TM, MS, CWH), pp. 859–860.
SACSAC-2006-LokhandeAG #image #parametricity
Identification of parameters and restoration of motion blurred images (RL, KVA, PG), pp. 301–305.
SACSAC-2006-WangTTY #approach #multi
An approach for identifying attribute correspondences in multilingual schemas (HW, ST, YT, DY), pp. 1674–1678.
ASPLOSASPLOS-2006-ChilimbiG #debugging #detection #named #using
HeapMD: identifying heap-based bugs using anomaly detection (TMC, VG), pp. 219–228.
CASECASE-2006-DotoliFM #case study #online
On-Line Identification of Discrete Event Systems: a Case Study (MD, MPF, AMM), pp. 405–410.
CASECASE-2006-ZhangCY #adaptation #automation #fuzzy #hybrid
Adaptive Fuzzy Controller for Hybrid Traction Control System based on Automatic Road Identification (JZ, DC, CY), pp. 524–529.
DACDAC-2006-VimjamH #induction #performance #satisfiability
Fast illegal state identification for improving SAT-based induction (VCV, MSH), pp. 241–246.
DATEDATE-2006-BiswasDIP #architecture #automation #functional
Automatic identification of application-specific functional units with architecturally visible storage (PB, NDD, PI, LP), pp. 212–217.
DATEDATE-2006-RosselloS #fault
A compact model to identify delay faults due to crosstalk (JLR, JS), pp. 902–906.
STOCSTOC-2006-GavinskyKRW #bound #communication #complexity #exponential #quantum
Bounded-error quantum state identification and exponential separations in communication complexity (DG, JK, OR, RdW), pp. 594–603.
AMOSTA-MOST-J-2005-Robinson-MallettLMG06 #model checking #using #verification
Extended state identification and verification using a model checker (CRM, PL, TM, UG), pp. 981–992.
FATESFATES-RV-2006-KrichenT #finite #problem #transducer
State-Identification Problems for Finite-State Transducers (MK, ST), pp. 148–162.
DocEngDocEng-2005-BeheraLI #documentation
Influence of fusion strategies on feature-based identification of low-resolution documents (AB, DL, RI), pp. 20–22.
DRRDRR-2005-MaD #using
Font identification using the grating cell texture operator (HM, DSD), pp. 148–156.
ICDARICDAR-2005-BeheraLI #documentation #geometry #using
Enhancement of Layout-based Identification of Low-resolution Documents using Geometrical Color Distribution (AB, DL, RI), pp. 468–472.
ICDARICDAR-2005-BharathDM #approach #online #recognition
An Approach to Identify Unique Styles in Online Handwriting Recognition (AB, VD, SM), pp. 775–779.
ICDARICDAR-2005-BulacuS #clustering #comparison #verification
A Comparison of Clustering Methods for Writer Identification and Verification (MB, LS), pp. 1275–1279.
ICDARICDAR-2005-DholakiaNM
Zone Identification in the Printed Gujarati Text (JD, AN, SRM), pp. 272–276.
ICDARICDAR-2005-HeTFDY #novel
A Novel Method for Off-line Handwriting-based Writer Identification (ZH, YYT, BF, JD, XY), pp. 242–246.
ICDARICDAR-2005-JaegerMD
Identifying Script onWord-Level with Informational Confidenc (SJ, HM, DSD), pp. 416–420.
ICDARICDAR-2005-LiuCL #image #machine learning #using
Language Identification of Character Images Using Machine Learning Techniques (YHL, FC, CCL), pp. 630–634.
ICDARICDAR-2005-MandalCDC #automation #segmentation
A Hierarchical Method for Automated Identification and Segmentation of Forms (SM, SPC, AKD, BC), pp. 705–709.
ICDARICDAR-2005-PanSB #using
Script Identification Using Steerable Gabor Filters (WP, CYS, TDB), pp. 883–887.
ICDARICDAR-2005-SchlapbachKB #feature model
ImprovingWriter Identification by Means of Feature Selection and Extraction (AS, VK, HB), pp. 131–135.
ICDARICDAR-2005-TulyakovG
Combining Matching Scores in Identification Model (ST, VG), pp. 1151–1155.
ICDARICDAR-2005-YacoubP #documentation
Identification of Document Structure and Table of Content in Magazine Archives (SMY, JLAP), pp. 1253–1259.
CSMRCSMR-2005-SukumaranS #maintenance
Identifying Test Conditions for Software Maintenance (SS, AS), pp. 304–313.
ICSMEICSM-2005-AntoniolG #approach #case study #novel
Feature Identification: A Novel Approach and a Case Study (GA, YGG), pp. 357–366.
ICSMEICSM-2005-LuoZS #clustering #composition #object-oriented
A Hierarchical Decomposition Method for Object-Oriented Systems Based on Identifying Omnipresent Clusters (JL, LZ, JS), pp. 647–650.
ICSMEICSM-2005-MarcusR #concept #source code
Identifications of Concepts, Features, and Concerns in Source Code (AM, VR), p. 718.
IWPCIWPC-2005-KirkRW #framework #problem #reuse
Identifying and Addressing Problems in Framework Reuse (DK, MR, MW), pp. 77–86.
MSRMSR-2005-RoblesG #developer
Developer identification methods for integrated data from various sources (GR, JMGB), pp. 66–70.
DiGRADiGRA-2005-Martin #online #visual notation
Virtually Visual: The effects of visual technologies on online identification (JM).
VISSOFTVISSOFT-2005-SmithM #interactive #java #runtime #source code
Identifying Structural Features of Java Programs by Analysing the Interaction of Classes at Runtime (MPS, MM), pp. 108–113.
CAiSECAiSE-2005-RussellAHE #representation #tool support #workflow
Workflow Resource Patterns: Identification, Representation and Tool Support (NR, WMPvdA, AHMtH, DE), pp. 216–232.
ICEISICEIS-v2-2005-Celikel #approach #encryption
A Cryptographic Approach to Language Identification: PPM (EC), pp. 213–219.
ICEISICEIS-v5-2005-TopiLB #enterprise #implementation #usability
Identifying Usability Issues with an ERP Implementation (HT, WTL, TB), pp. 128–133.
CIKMCIKM-2005-ZhaoLTX #framework #performance #visualisation
Opportunity map: a visualization framework for fast identification of actionable knowledge (KZ, BL, TMT, WX), pp. 60–67.
ICMLICML-2005-SilvaS #learning #modelling
New d-separation identification results for learning continuous latent variable models (RBdAeS, RS), pp. 808–815.
ICMLICML-2005-SimsekWB #clustering #graph #learning
Identifying useful subgoals in reinforcement learning by local graph partitioning (ÖS, APW, AGB), pp. 816–823.
SEKESEKE-2005-ZhangLY #delivery #re-engineering
Service Identification and Packaging in Service Oriented Reengineering (ZZ, RL, HY), pp. 620–625.
SIGIRSIGIR-2005-MetzlerBCMZ #data flow
The recap system for identifying information flow (DM, YB, WBC, AM, JZ), p. 678.
RERE-2005-LutzNPFT #analysis #requirements #using
Identifying Contingency Requirements Using Obstacle Analysis (RRL, SN, APH, CRF, DT), pp. 263–272.
RERE-2005-SampaioRR #approach #aspect-oriented #named #requirements
Early-AIM: An Approach for Identifying Aspects in Requirements (AS, AR, PR), pp. 487–488.
RERE-2005-SvetinovicBG #analysis #concept #object-oriented #student #why
Concept Identification in Object-Oriented Domain Analysis: Why Some Students Just Don’t Get It (DS, DMB, MWG), pp. 189–198.
ASEASE-2005-LienhardDA #concept analysis
Identifying traits with formal concept analysis (AL, SD, GA), pp. 66–75.
ASEASE-2005-Milanova #composition #diagrams #precise #uml
Precise identification of composition relationships for UML class diagrams (AM), pp. 76–85.
ASEASE-2005-SampaioCR #aspect-oriented #automation #named #requirements
EA-Miner: a tool for automating aspect-oriented requirements identification (AS, RC, PR), pp. 352–355.
SACSAC-2005-AnshulR #network
A ZKP-based identification scheme for base nodes in wireless sensor networks (DA, SR), pp. 319–323.
SACSAC-2005-HsiehCK #online #performance
Efficient on-line identification of hot data for flash-memory management (JWH, LPC, TWK), pp. 838–842.
SACSAC-2005-JangSSH #comparison
A comparison on information fusion methods for air target identification (DJ, SYS, CYS, CCH), pp. 45–46.
SACSAC-2005-MartinsS #web
Language identification in web pages (BM, MJS), pp. 764–768.
SACSAC-2005-PaulyS
Identifying topological predicates for vague spatial objects (AP, MS), pp. 587–591.
CASECASE-2005-KimKYT #realtime #using
Dynamic shipment planning in an automobile shipment yard using real-time radio frequency identification (RFID) information (JK, SRTK, STY, JDT), pp. 148–153.
FASEFASE-2005-ChangHK #clustering #component
A Tool to Automate Component Clustering and Identification (SHC, MJH, SDK), pp. 141–144.
CSLCSL-2005-SchurmannS #polynomial #recursion
Identifying Polynomial-Time Recursive Functions (CS, JS), pp. 525–540.
ICTSSTestCom-2005-KrichenT #automaton #problem
State Identification Problems for Timed Automata (MK, ST), pp. 175–191.
DocEngDocEng-2004-BeheraLI #documentation #image #visual notation
Visual signature based identification of Low-resolution document images (AB, DL, RI), pp. 178–187.
DocEngDocEng-2004-YehC #topic
Creation of topic map by identifying topic chain in chinese (CLY, YCC), pp. 112–114.
DRRDRR-2004-MaD #documentation #image #word
Word level script identification for scanned document images (HM, DSD), pp. 124–135.
DRRDRR-2004-OzawaTKNY #image
Slide identification for lecture movies by matching characters and images (NO, HT, YK, SN, HY), pp. 74–81.
SIGMODSIGMOD-2004-VlachosMV #online #query
Identifying Similarities, Periodicities and Bursts for Online Search Queries (MV, CM, ZV, DG), pp. 131–142.
ICSMEICSM-2004-BruntinkDTE #clone detection #detection #evaluation
An Evaluation of Clone Detection Techniques for Identifying Crosscutting Concerns (MB, AvD, TT, RvE), pp. 200–209.
ICSMEICSM-2004-FengZWW #anti #design
Software Design Improvement through Anti-Patterns Identification (TF, JZ, HW, XW), p. 524.
ICSMEICSM-2004-Rountev #java #precise
Precise Identification of Side-Effect-Free Methods in Java (AR), pp. 82–91.
WCREWCRE-2004-MarinDM #analysis #aspect-oriented #using
Identifying Aspects Using Fan-In Analysis (MM, AvD, LM), pp. 132–141.
ICEISICEIS-v1-2004-LuciaST #clone detection #similarity #using #web
Identifying Clones in Dynamic Web Sites Using Similarity Thresholds (ADL, GS, GT), pp. 391–396.
ICEISICEIS-v2-2004-BailonGPQ
G.R.E.E.N. — An Expert System to Identify Gymnosperms (ABB, ELGG, RPP, CQ), pp. 216–221.
ICEISICEIS-v4-2004-CostaOS
E-Services in Mission-Critical Organizations: Identification Enforcement (CC, JLO, AS), pp. 389–396.
CIKMCIKM-2004-LiO #learning #music
Semi-supervised learning for music artists style identification (TL, MO), pp. 152–153.
ECIRECIR-2004-ChenTH #corpus #novel #using
Identification of Relevant and Novel Sentences Using Reference Corpus (HHC, MFT, MHH), pp. 85–98.
ICMLICML-2004-SimsekB #abstraction #learning #using
Using relative novelty to identify useful temporal abstractions in reinforcement learning (ÖS, AGB).
ICPRICPR-v1-2004-GarainCC #documentation #embedded
Identification of Embedded Mathematical Expressions in Scanned Documents (UG, BBC, ARC), pp. 384–387.
ICPRICPR-v1-2004-ParkL #distance #fault #image #using
Enhancing Low-Resolution Facial Images Using Error Back-Projection for Human Identification at a Distance (JSP, SWL), pp. 346–349.
ICPRICPR-v2-2004-GutierrezRA
Weighted Loss Functions to Make Risk-based Language Identification Fused Decisions (JG, JLR, RAO), pp. 863–866.
ICPRICPR-v2-2004-MaddageXW #modelling
Singer Identification Based on Vocal and Instrumental Models (NCM, CX, YW), pp. 375–378.
ICPRICPR-v2-2004-OhteraH #using
Faxed Form Identification using Histogram of the Hough-Space (RO, TH), pp. 566–569.
ICPRICPR-v2-2004-PranckevicieneBS #classification
Consensus-Based Identification of Spectral Signatures for Classification of High-Dimensional Biomedical Spectra (EP, RB, RLS), pp. 319–322.
ICPRICPR-v2-2004-SchlapbachB #using
Off-line Handwriting Identification Using HMM Based Recognizers (AS, HB), pp. 654–658.
ICPRICPR-v3-2004-EhtiatiC #architecture
A Strongly Coupled Architecture for Contextual Object and Scene Identification (TE, JJC), pp. 69–72.
ICPRICPR-v3-2004-GaoLT #music
Indexing with Musical Events and Its Application to Content-Based Music Identification (SG, CHL, QT), pp. 846–849.
ICPRICPR-v3-2004-TonniesPC #image
Local Identification and Removal of Scatter Artefacts based on the Temporal Information in Dynamic SPECT images (KDT, CP, AC), pp. 762–765.
ICPRICPR-v3-2004-ZhangSGCCY
Information Fusion in Face Identification (WZ, SS, WG, YC, BC, PY), pp. 950–953.
ICPRICPR-v4-2004-AggarwalCC #approach #recognition
A System Identification Approach for Video-based Face Recognition (GA, AKRC, RC), pp. 175–178.
ICPRICPR-v4-2004-EveringhamZ #automation #visual notation
Automated Visual Identification of Characters in Situation Comedies (ME, AZ), pp. 983–986.
ICPRICPR-v4-2004-HuangL04a
A Vision-Based Vehicle Identification System (CLH, WCL), pp. 364–367.
ICPRICPR-v4-2004-KobayashiO #higher-order #multi #polynomial #using
Action and Simultaneous Multiple-Person Identification Using Cubic Higher-Order Local Auto-Correlation (TK, NO), pp. 741–744.
ICPRICPR-v4-2004-KrichenMGD #using
Iris Identification Using Wavelet Packets (EK, MAM, SGS, BD), pp. 335–338.
KDDKDD-2004-RusmevichientongZS
Identifying early buyers from purchase data (PR, SZ, DS), pp. 671–677.
KDDKDD-2004-XiongSTK #bound #correlation
Exploiting a support-based upper bound of Pearson’s correlation coefficient for efficiently identifying strongly correlated pairs (HX, SS, PNT, VK), pp. 334–343.
ECOOPECOOP-2004-McCamantE #component #multi
Early Identification of Incompatibilities in Multi-component Upgrades (SM, MDE), pp. 440–464.
RERE-2004-KaiyaOK #case study #diagrams
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems (HK, AO, KK), pp. 112–121.
SACSAC-2004-Lanitis #image
Person identification from heavily occluded face images (AL), pp. 5–9.
SACSAC-2004-LinsG #automation
Automatic language identification of written texts (RDL, PG), pp. 1128–1133.
SACSAC-2004-WeisserK #metric #sequence #statistics #using
Identification of fundamental building blocks in protein sequences using statistical association measures (DKW, JKS), pp. 154–161.
CGOCGO-2004-PanaitSW
Static Identification of Delinquent Loads (VMP, AS, WFW), pp. 303–314.
DATEDATE-v1-2004-HuangM #behaviour #modelling
Identification and Modeling of Nonlinear Dynamic Behavior in Analog Circuits (XH, HAM), pp. 460–467.
DATEDATE-v1-2004-PadmanabanT #fault #performance #using
Using BDDs and ZBDDs for Efficient Identification of Testable Path Delay Faults (SP, ST), pp. 50–55.
DATEDATE-v1-2004-VandersteenPLD #linear
Extended Subspace Identification of Improper Linear Systems (GV, RP, DL, SD), pp. 454–459.
DRRDRR-2003-OgataWIYFSF #implementation
Form-type identification for banking applications and its implementation issues (HO, SW, AI, TY, NF, HS, HF), pp. 208–218.
DRRDRR-2003-ZhangS #difference #metric
Binary vector dissimilarity measures for handwriting identification (BZ, SNS), pp. 28–38.
TPDLECDL-2003-ShipmanPMG #documentation
Identifying Useful Passages in Documents Based on Annotation Patterns (FMSI, MNP, CCM, GG), pp. 101–112.
ICDARICDAR-2003-AblavskyS #automation #documentation #feature model
Automatic Feature Selection with Applications to Script Identification of Degraded Documents (VA, MRS), pp. 750–754.
ICDARICDAR-2003-AndersenZ #documentation
Features for Neural Net Based Region Identification of Newspaper Documents (TLA, WZ), pp. 403–407.
ICDARICDAR-2003-BensefiaPH #information retrieval
Information Retrieval Based Writer Identification (AB, TP, LH), pp. 946–950.
ICDARICDAR-2003-BulacuSV #using
Writer Identification Using Edge-Based Directional Features (MB, LS, LV), pp. 937–941.
ICDARICDAR-2003-HuB #image #web
Identifying Story and Preview Images in News Web Pages (JH, AB), pp. 640–644.
ICDARICDAR-2003-LeedhamC #using
Writer Identification using Innovative Binarised Features of Handwritten Numerals (GL, SC), pp. 413–417.
ICDARICDAR-2003-PalSC #documentation #multi
Multi-Script Line identification from Indian Document (UP, SS, BBC), pp. 880–884.
ICDARICDAR-2003-SakoSFII #recognition
Form Reading based on Form-type Identification and Form-data Recognition (HS, MS, NF, HI, AI), p. 926–?.
ICDARICDAR-2003-SeropianGV
Writer Identification based on the fractal construction of a reference base (AS, MG, NV), pp. 1163–1167.
ICDARICDAR-2003-WangDL #linear #using
Writer Identification Using Directional Element Features and Linear Transform (XW, XD, HL), pp. 942–945.
ICDARICDAR-2003-WirotiusSV
Writer Identification from Gray Level Distribution (MW, AS, NV), pp. 1168–1172.
ICDARICDAR-2003-ZhengLD03a #documentation #image #markov #random #using
Text Identification in Noisy Document Images Using Markov Random Field (YZ, HL, DSD), p. 599–?.
CSMRCSMR-2003-ClarkeMG #object-oriented #taxonomy #using
Using a Taxonomy Tool to Identify Changes in OO Softwar (PJC, BAM, JPG), pp. 213–222.
CSMRCSMR-2003-TourweM #logic #metaprogramming #refactoring #using
Identifying Refactoring Opportunities Using Logic Meta Programming (TT, TM), pp. 91–100.
IWPCIWPC-2003-RillingK #complexity #comprehension #metric #slicing #using
Identifying Comprehension Bottlenecks Using Program Slicing and Cognitive Complexity Metric (JR, TK), pp. 115–124.
WCREWCRE-2003-BevanW
Identification of Software Instabilities (JB, EJWJ), pp. 134–145.
DiGRADiGRA-2003-Walz #game studies #persuasion #towards
Delightful identification & persuasion: towards an analytical and applied rhetoric of digital games (SPW).
EDOCEDOC-2003-NealCLMGK #contract #monitoring #requirements
Identifying requirements for Business Contract Language: a Monitoring Perspectiv (SWN, JBC, PFL, ZM, SG, SK), pp. 50–61.
ICEISICEIS-v2-2003-Drori #documentation #information management #research #using
Using Knowledge Engineering Tool to Identify the Subject of a Document — Research Results (OD), pp. 442–445.
ICEISICEIS-v2-2003-ReBB #behaviour
The Use of Neurofuzzy Computable System to Identify Prominent Behavior Characteristics in Successful Entrepreneurs (AR, RB, LB), pp. 522–528.
ICEISICEIS-v2-2003-SilvaIE #analysis #database #information management #using
Using Knowledge Discovery to Identify Analysis Patterns for Geographic Database (CS, CI, PME), pp. 359–364.
ICEISICEIS-v3-2003-ThomI #aspect-oriented #design #workflow
Identifying Patterns of Workflow Design Relying on Organizational Structure Aspects (LHT, CI), pp. 462–467.
ICEISICEIS-v4-2003-MajS #flexibility #scalability
Scalable and Flexible Electronic Identification (SPM, DTS), pp. 335–339.
CIKMCIKM-2003-CampbellMCD #email #using
Expertise identification using email communications (CSC, PPM, AC, BD), pp. 528–531.
CIKMCIKM-2003-LalmasR #automation #documentation #retrieval
Automatic identification of best entry points for focused structured document retrieval (ML, JR), pp. 540–543.
ICMLICML-2003-McGovernJ #learning #multi #predict #relational #using
Identifying Predictive Structures in Relational Data Using Multiple Instance Learning (AM, DJ), pp. 528–535.
SEKESEKE-2003-BahetiWDC #information management #on the
On Identifying Deficiencies in a Knowledge Management System (PB, LAW, AD, AC), pp. 385–392.
SACSAC-2003-LeeLTY
Identify Amino Acid Candidates Critical for Function of Rat Imidase by Cross-reference Voting in Imidase SuperFamily (CL, YtL, CYT, YSY), pp. 127–134.
DATEDATE-2003-LiuC #approach #fault
A Partition-Based Approach for Identifying Failing Scan Cells in Scan-BIST with Applications to System-on-Chip Fault Diagnosis (CL, KC), pp. 10230–10237.
DATEDATE-2003-LoKWH #design #standard
A Custom-Cell Identification Method for High-Performance Mixed Standard/Custom-Cell Designs (JYLL, WAK, ACHW, TH), pp. 11102–11103.
DATEDATE-2003-SyalH #algorithm #fault #low cost #novel
A Novel, Low-Cost Algorithm for Sequentially Untestable Fault Identification (MS, MSH), pp. 10316–10321.
DATEDATE-2003-WegenerK #fault #linear #modelling
Linear Model-Based Error Identification and Calibration for Data Converters (CW, MPK), pp. 10630–10635.
SCAMSCAM-J-2001-SouterP02 #automation
Characterization and automatic identification of type infeasible call chains (ALS, LLP), pp. 721–732.
ICSMEICSM-2002-Jungmayr #dependence
Identifying Test-Critical Dependencies (SJ), pp. 404–413.
CSCWCSCW-2002-WhittakerJT #communication
Contact management: identifying contacts to support long-term communication (SW, QJ, LGT), pp. 216–225.
CIKMCIKM-2002-LiuH #classification #music
A singer identification technique for content-based classification of MP3 music objects (CCL, CSH), pp. 438–445.
ICPRICPR-v1-2002-Hayfron-AcquahNC #symmetry
Human Identification by Spatio-Temporal Symmetry (JBHA, MSN, JNC), pp. 632–635.
ICPRICPR-v1-2002-PhillipsSRGB #algorithm #challenge #problem #set
The Gait Identification Challenge Problem: Data Sets and Baseline Algorithm (PJP, SS, IRV, PG, KWB), pp. 385–388.
ICPRICPR-v1-2002-WangHT
A New Attempt to Gait-based Human Identification (LW, WH, TT), pp. 115–118.
ICPRICPR-v1-2002-WuWZ #energy #fuzzy
Fuzzy Directional Element Energy Feature (FDEEF) Based Palmprint Identification (XW, KW, DZ), pp. 95–98.
ICPRICPR-v1-2002-WuYS
Optimal Gabor Filters for High Speed Face Identification (HW, YY, TS), pp. 107–110.
ICPRICPR-v1-2002-YamNC #automation #on the
On the Relationship of Human Walking and Running: Automatic Person Identification by Gait (CYY, MSN, JNC), pp. 287–290.
ICPRICPR-v2-2002-GuimaraesACL #detection #video
Video Fade Detection by Discrete Line Identification (SJFG, AdAA, MC, NJL), pp. 1013–1016.
ICPRICPR-v2-2002-Keren #naive bayes #using
Painter Identification Using Local Features and Naive Bayes (DK), pp. 474–477.
ICPRICPR-v2-2002-Miyamori #behaviour #retrieval #using #video
Improving Accuracy in Behaviour Identification for Content-Based Retrieval by Using Audio and Video Information (HM), pp. 826–830.
ICPRICPR-v2-2002-Mustafa #image
Identifying and Classifying Image Transforms (AAYM), pp. 806–809.
ICPRICPR-v2-2002-PereraGSPM #pattern matching #pattern recognition #recognition
Machine Olfaction: Pattern Recognition for the Identification of Aromas (AP, AGB, TS, TP, SM), pp. 410–413.
ICPRICPR-v2-2002-QunTHC #algorithm #automation #clustering #using
Automatic Fingerprint Identification Using Cluster Algorithm (QR, JT, YH, JC), pp. 398–401.
ICPRICPR-v3-2002-JohnsonB #metric
Relationship between Identification Metrics: Expected Confusion and Area Under a ROC Curve (AYJ, AFB), pp. 662–666.
ICPRICPR-v3-2002-MottlKKYK #grid #image #similarity
Elastic Transformation of the Image Pixel Grid for Similarity Based Face Identification (VM, AK, AK, AY, JK), pp. 549–552.
ICPRICPR-v3-2002-StevensSP #using
Identifying Vehicles Using Vibrometry Signatures (MRS, MS, DP), pp. 253–256.
ICPRICPR-v3-2002-SuW #learning #process
A Learning Process to the Identification of Feature Points on Chinese Characters (YMS, JFW), pp. 93–97.
ICPRICPR-v4-2002-BenAbdelkaderCD #automation #estimation #using
Person Identification Using Automatic Height and Stride Estimation (CB, RC, LSD), pp. 377–380.
ICPRICPR-v4-2002-MottlKK #classification #kernel
Support Object Classifiers with Rigid and Elastic Kernel Functions for Face Identification (VM, AK, JK), pp. 205–208.
KDDKDD-2002-FangHL #using
Tumor cell identification using features rules (BF, WH, MLL), pp. 495–500.
KDDKDD-2002-Frigui #approach #clustering #named #performance #scalability #set
SyMP: an efficient clustering approach to identify clusters of arbitrary shapes in large data sets (HF), pp. 507–512.
KDDKDD-2002-TejadaKM #independence #learning #string
Learning domain-independent string transformation weights for high accuracy object identification (ST, CAK, SM), pp. 350–359.
PLDIPLDI-2002-BudimlicCHKOR #performance
Fast Copy Coalescing and Live-Range Identification (ZB, KDC, TJH, KK, TSO, SWR), pp. 25–32.
ASEASE-2002-DiasR #component #concurrent
Identifying Cause & Effect Relations between Events in Concurrent Event-Based Components (MSD, DJR), pp. 245–248.
ICSEICSE-2002-MockusH #approach
Expertise browser: a quantitative approach to identifying expertise (AM, JDH), pp. 503–512.
SACSAC-2002-BesnardL #constraints #design #industrial #lessons learnt #optimisation #re-engineering #reuse
Lessons from industrial design for software engineering through constraints identification, solution space optimisation and reuse (DB, ATL), pp. 732–738.
DACDAC-2002-ZengAA #using
False timing path identification using ATPG techniques and delay-based information (JZ, MSA, JAA), pp. 562–565.
DATEDATE-2002-Hsiao #fault
Maximizing Impossibilities for Untestable Fault Identification (MSH), pp. 949–953.
DATEDATE-2002-LiuCG
An Interval-Based Diagnosis Scheme for Identifying Failing Vectors in a Scan-BIST Environment (CL, KC, MG), pp. 382–386.
DATEDATE-2002-PozziVI #automation #embedded
Automatic Topology-Based Identification of Instruction-Set Extensions for Embedded Processors (LP, MV, PI), p. 1138.
TPDLECDL-2001-RadevBZR #independence #interactive #summary #topic
Interactive, Domain-Independent Identification and Summarization of Topically Related News Articles (DRR, SBG, ZZ, RSR), pp. 225–238.
ICDARICDAR-2001-ElgammalI01a #documentation #hybrid #image
Techniques for Language Identification for Hybrid Arabic-English Document Images (AME, MAI), pp. 1100–1104.
ICDARICDAR-2001-FanCW #documentation #using
Form Document Identification Using Line Structure Based Features (KCF, MLC, YKW), pp. 704–708.
ICDARICDAR-2001-IwataYYKIM #library #using
Book Cover Identification by Using Four Directional Features Filed for a Small-Scale Library System (KI, KY, MY, KK, MI, KM), pp. 582–586.
ICDARICDAR-2001-KikuchiA #development
Development of Speedy and High Sensitive Pen System for Writing Pressure and Writer Identification (MK, NA), pp. 1040–1044.
ICDARICDAR-2001-LeedhamTY #markov #using
Handwritten Country Name Identification Using Vector Quantisation and Hidden Markov Model (GL, WKT, WLY), pp. 685–688.
ICDARICDAR-2001-MartiMB #using
Writer Identification Using Text Line Based Features (UVM, RM, HB), pp. 101–105.
ICDARICDAR-2001-PalC #automation
Automatic Identification of English, Chinese, Arabic, Devnagari and Bangla Script Line (UP, BBC), pp. 790–794.
JCDLJCDL-2001-WacholderEK #automation #interactive
Automatic identification and organization of index terms for interactive browsing (NW, DKE, JK), pp. 126–134.
ITiCSEITiCSE-2001-Huizinga #online #programming #topic
Identifying topics for instructional improvement through on-line tracking of programming assignments (DMH), pp. 129–132.
SCAMSCAM-2001-AntoniolVDCM #clone detection #kernel #linux
Identifying Clones in the Linux Kernel (GA, UV, MDP, GC, EM), pp. 92–99.
WCREWCRE-2001-Krinke #dependence #graph
Identifying Similar Code with Program Dependence Graphs (JK), pp. 301–309.
CHICHI-2001-BhavnaniRJ #education #using
Beyond command knowledge: identifying and teaching strategic knowledge for using complex computer applications (SKB, FR, BEJ), pp. 229–236.
EDOCEDOC-2001-JainCIR #approach #component #formal method
Business Component Identification — A Formal Approach (HKJ, NC, NI, BR), pp. 183–187.
ICEISICEIS-v2-2001-NunesP #enterprise #information management #modelling
The Use of Information Systems Modelling to Identify and Evaluate E-Business Strategies for Small and Medium Enterprises (SMES) (JMBN, DP), pp. 1018–1025.
CIKMCIKM-2001-MarcusML #fault #set
Ordinal Association Rules for Error Identification in Data Sets (AM, JIM, KIL), pp. 589–591.
KDDKDD-2001-LiuHM
Identifying non-actionable association rules (BL, WH, YM), pp. 329–334.
MLDMMLDM-2001-FischerB #automation #using
Automatic Identification of Diatoms Using Decision Forests (SF, HB), pp. 173–183.
SASSAS-2001-KomondoorH #slicing #source code #using
Using Slicing to Identify Duplication in Source Code (RK, SH), pp. 40–56.
ASEASE-2001-MarcusM #concept #source code
Identification of High-Level Concept Clones in Source Code (AM, JIM), pp. 107–114.
FSEESEC-FSE-2001-Brada #component #specification
Component revision identification based on IDL/ADL component specification (PB), pp. 297–298.
SACSAC-2001-Grigoriev
Computational structural genomics: identifying protein targets for structural studies (IVG), pp. 41–45.
SACSAC-2001-ZhouCH #correlation #optimisation #problem #set #using
Identifying the most significant pairwise correlations of residues in different positions of helices: the subset selection problem using least squares optimization (XZ, GC, MTH), pp. 51–55.
DACDAC-2001-XiaoM #analysis #correlation #functional
Functional Correlation Analysis in Crosstalk Induced Critical Paths Identification (TX, MMS), pp. 653–656.
DATEDATE-2001-ZengABA
Full chip false timing path identification: applications to the PowerPCTM microprocessors (JZ, MSA, JB, JAA), pp. 514–519.
ADLADL-2000-PopesculFLUG #clustering #database #documentation #roadmap
Clustering and Identifying Temporal Trends in Document Databases (AP, GWF, SL, LHU, CLG), pp. 173–182.
SIGMODSIGMOD-2000-BreunigKNS #named
LOF: Identifying Density-Based Local Outliers (MMB, HPK, RTN, JS), pp. 93–104.
VLDBVLDB-2000-KoudasIM #roadmap #set #sketching #using
Identifying Representative Trends in Massive Time Series Data Sets Using Sketches (PI, NK, SM), pp. 363–372.
CSMRCSMR-2000-AntoniolCCL #case study #maintenance #set
Identifying the Starting Impact Set of a Maintenance Request: A Case Study (GA, GC, GC, ADL), pp. 227–230.
ICSMEICSM-2000-MockusV #database #using
Identifying Reasons for Software Changes using Historic Databases (AM, LGV), pp. 120–130.
IWPCIWPC-2000-AntoniolCM
Identification of Lower-Level Artifacts (GA, GC, EM), p. 253.
ICMLICML-2000-CohnC #documentation #learning
Learning to Probabilistically Identify Authoritative Documents (DC, HC), pp. 167–174.
ICMLICML-2000-ColtonBW #automation #concept
Automatic Identification of Mathematical Concepts (SC, AB, TW), pp. 183–190.
ICMLICML-2000-DyB #learning #order #set
Feature Subset Selection and Order Identification for Unsupervised Learning (JGD, CEB), pp. 247–254.
ICMLICML-2000-WalkerWL #comprehension #fault #natural language #using
Using Natural Language Processing and discourse Features to Identify Understanding Errors (MAW, JHW, IL), pp. 1111–1118.
ICPRICPR-v2-2000-RitterG #approach #pattern matching #pattern recognition #recognition
A Bayesian Approach to Object Identification in Pattern Recognition (GR, MTG), pp. 2418–2421.
ICPRICPR-v2-2000-ZhuTW
Biometric Personal Identification Based on Handwritin (YZ, TT, YW), pp. 2797–2800.
ICPRICPR-v2-2000-ZhuTW00a
Biometric Personal Identification Based on Iris Patterns (YZ, TT, YW), pp. 2801–2804.
ICPRICPR-v3-2000-NodaK #adaptation #probability #using
Adaptive Speaker Identification Using Sequential Probability Ratio Test (HN, EK), pp. 3266–3269.
ICPRICPR-v4-2000-ColiosT #invariant #permutation
Landmark Identification Based on Projective and Permutation Invariant Vectors (CIC, PET), pp. 4128–4131.
ICPRICPR-v4-2000-TruongVD #automation #categorisation #video
Automatic Genre Identification for Content-Based Video Categorization (BTT, SV, CD), pp. 4230–4233.
KDDKDD-2000-ChouGGK
Identifying prospective customers (PBC, EG, DG, PK), pp. 447–456.
KDDKDD-2000-FlakeLG #community #performance #web
Efficient identification of Web communities (GWF, SL, CLG), pp. 150–160.
TOOLSTOOLS-PACIFIC-2000-BarberG #architecture #object-oriented #tool support
Tool Support for Systematic Class Identification in Object-Oriented Software Architectures (KSB, TJG), pp. 82–93.
ASEASE-2000-BuenoJ #monitoring #testing
Identification of Potentially Infeasible Program Paths by Monitoring the Search for Test Data (PMSB, MJ), pp. 209–218.
DATEDATE-2000-GulrajaniH #logic #multi
Multi-Node Static Logic Implications for Redundancy Identification (KG, MSH), pp. 729–733.
ICDARICDAR-1999-ChaudhuryS
Trainable Script Identification Strategies for Indian Languages (SC, RS), pp. 657–660.
ICDARICDAR-1999-Ho #keyword #learning #performance #word
Fast Identification of Stop Words for Font Learning and Keyword Spotting (TKH), pp. 333–336.
ICDARICDAR-1999-Karnik
Identifying Devnagri Characters (RRK), pp. 669–672.
ICDARICDAR-1999-KochiS #documentation
User-defined Template for Identifying Document Type and Extracting Information from Documents (TK, TS), pp. 127–130.
ICDARICDAR-1999-SobottkaBK
Identification of Text on Colored Book and Journal Covers (KS, HB, HK), pp. 57–62.
SIGMODSIGMOD-1999-AnkerstBKS #clustering #named
OPTICS: Ordering Points To Identify the Clustering Structure (MA, MMB, HPK, JS), pp. 49–60.
IWPCIWPC-1999-CanforaCLL #approach #case study
A Case Study of Applying an Eclectic Approach to Identify Objects in Code (GC, AC, ADL, GADL), pp. 136–143.
PASTEPASTE-1999-FieldR #cobol #source code
Identifying Procedural Structure in Cobol Programs (JF, GR), pp. 1–10.
HCIHCI-CCAD-1999-Komischke #branch #process #sequence
Identifying core sequences in process control across branches (TK), pp. 1301–1305.
CAiSECAiSE-1999-SadiqO #graph #modelling #process #reduction
Applying Graph Reduction Techniques for Identifying Structural Conflicts in Process Models (WS, MEO), pp. 195–209.
KDDKDD-1999-Oates #clustering #multi #sequence
Identifying Distinctive Subsequences in Multivariate Time Series by Clustering (TO), pp. 322–326.
TOOLSTOOLS-EUROPE-1999-Poo #case study #specification
Events in Use Cases as a Basis for Identifying and Specifying Classes and Business Rules (DCCP), pp. 204–213.
POPLPOPL-1999-RamalingamFT #program analysis
Aggregate Structure Identification and Its Application to Program Analysis (GR, JF, FT), pp. 119–132.
ICSEICSE-1999-DeursenK #clustering #concept analysis #using
Identifying Objects Using Cluster and Concept Analysis (AvD, TK), pp. 246–255.
DATEDATE-1999-EijkJMT #algorithm #symmetry
Identification and Exploitation of Symmetries in DSP Algorithms (CAJvE, ETAFJ, BM, AHT), pp. 602–608.
DATEDATE-1999-KonijnenburgLG #generative #testing
Illegal State Space Identification for Sequential Circuit Test Generation (MHK, JTvdL, AJvdG), pp. 741–746.
TPDLECDL-1998-YuwonoA #statistics #summary
Statistical Identification of Domain-Specific Keyterms for Text Summarisation (BY, MA), pp. 637–638.
CSMRCSMR-1998-HongK #empirical #fault
Identifying Fault Prone Modules: An Empirical Study in Telecommunication System (SH, KK), pp. 179–184.
ICSMEICSM-1998-CimitileLL #empirical #persistent #scalability
An Experiment in Identifying Persistent Objects in Large Systems (AC, ADL, GADL), p. 122–?.
ICSMEICSM-1998-FiutemA #case study #consistency #nondeterminism #object-oriented
Identifying Design-Code Inconsistencies in Object-Oriented Software: A Case Study (RF, GA), p. 94–?.
ICSMEICSM-1998-OcaC #data mining #mining #using
Identification of Data Cohesive Subsystems Using Data Mining Techniques (CMdO, DLC), pp. 16–23.
ICSMEICSM-1998-OhlssonW #component #legacy
Identification of Green, Yellow and Red Legacy Components (MCO, CW), pp. 6–15.
WCREWCRE-1998-ValasareddiC #graph #process #source code
A Graph-Based Object Identification Process for Procedural Programs (RRV, DLC), pp. 50–58.
ICPRICPR-1998-BesacierB
Time and frequency pruning for speaker identification (LB, JFB), pp. 1619–1621.
ICPRICPR-1998-FanC #documentation #using
Form document identification using line structure based features (KCF, MLC), pp. 1098–1100.
ICPRICPR-1998-FinchA #image
Identification of airfield runways in synthetic aperture radar images (IF, AA), pp. 1633–1636.
ICPRICPR-1998-HameyYWS #image #preprocessor #segmentation #self
Pre-processing colour images with a self-organising map: baking curve identification and bake image segmentation (LGCH, JCHY, TW, SKYS), pp. 1771–1775.
ICPRICPR-1998-HerouxDRT #automation #classification
Classification method study for automatic form class identification (PH, SD, AR, ÉT), pp. 926–928.
ICPRICPR-1998-JainHK #named #using
F2ID: a personal identification system using faces and fingerprints (AKJ, LH, YK), pp. 1373–1375.
ICPRICPR-1998-LiD #automation #video
Automatic identification of text in digital video key frames (HL, DSD), pp. 129–132.
ICPRICPR-1998-OkataniD #invariant #on the #problem #using
On identification of singular points using photometric invariants for global shape from shading problem (TO, KD), pp. 1787–1790.
ICPRICPR-1998-OsbergerM #automation #image
Automatic identification of perceptually important regions in an image (WO, AJM), pp. 701–704.
ICPRICPR-1998-SaidBT
Personal identification based on handwriting (HESS, KDB, TNT), pp. 1761–1764.
ICPRICPR-1998-WarkSC #approach #feature model #modelling #statistics
An approach to statistical lip modelling for speaker identification via chromatic feature extraction (TW, SS, VC), pp. 123–125.
KDDKDD-1998-LaneB #concept #learning #online #security
Approaches to Online Learning and Concept Drift for User Identification in Computer Security (TL, CEB), pp. 259–263.
ASEASE-1998-Ledru #proving #theorem proving
Identifying Pre-Conditions with the Z/EVES Theorem Prover (YL), p. 32–?.
ICDARICDAR-1997-NobileBSK #documentation #online #using #word
Language identification of on-line documents using word shapes (NN, SB, CYS, SK), pp. 258–262.
ICSMEICSM-1997-SiffR #concept analysis
Identifying modules via concept analysis (MS, TWR), pp. 170–179.
WCREWCRE-1997-WiggertsBF #legacy
Scenarios for the Identification of Objects in Legacy Systems (TW, HB, EF), pp. 24–32.
WPCWPC-1997-CimitileLLF #legacy
Identifying objects in legacy systems (AC, ADL, GADL, ARF), pp. 138–147.
WPCWPC-1997-YangLC #component #comprehension #program transformation #reuse
Code Understanding through Program Transformation for Reusable Component Identification (HY, PL, WCC), pp. 148–157.
HCIHCI-CC-1997-DobronetsSV
Ergodynamic Method of Identification of the Cognitive Strategy Used by the Human-Operator (BSD, AAS, VFV), pp. 837–840.
HCIHCI-CC-1997-ShafferC #question #reduction #why
Identifying Areas for Workload Reduction Through System Changes: Why Bother? (MTS, HKC), pp. 497–500.
KDDKDD-1997-TurmonMP
Bayesian Inference for Identifying Solar Active Regions (MJT, SM, JP), pp. 267–270.
ASEASE-1997-SahraouiMLD #concept
Applying Concept Formation Methods to Object Identification in Procedural Code (HAS, WLM, HL, FD), pp. 210–218.
WCREWCRE-1996-GravleyL
Identifying Enumeration Types Modeled with Symbolic Constants (JMG, AL), p. 227–?.
FMFME-1996-ChalinGR #interface #specification
Identification of and Solutions to Shortcomings of LCL, a Larch/C Interface Specification Language (PC, PG, TR), pp. 385–404.
CHICHI-1996-VirziSK #problem #prototype #usability #using
Usability Problem Identification Using Both Low- and High-Fidelity Prototypes (RAV, JLS, DK), pp. 236–243.
CSCWCSCW-1996-McDanielOM #multi #thread
Identifying and Analyzing Multiple Threads in Computer-Mediated and Face-to-Face Conversations (SEM, GMO, JCM), pp. 39–47.
ICMLICML-1996-EngelsonK
Identifying the Information Contained in a Flawed Theory (SPE, MK), pp. 131–138.
ICPRICPR-1996-AchermannB #classification
Combination of face classifiers for person identification (BA, HB), pp. 416–420.
ICPRICPR-1996-AzencottDP #multi #scalability
Multiscale identification of buildings in compressed large aerial scenes (RA, FD, JP), pp. 974–978.
ICPRICPR-1996-CucchiaraF
The vector-gradient Hough transform for identifying straight-translation generated shapes (RC, FF), pp. 502–510.
ICPRICPR-1996-DiasBD #classification #using
Results of the use of Bayesian classifiers for identification of breast cancer cell nuclei (ÂVD, FB, MRD), pp. 508–512.
ICPRICPR-1996-LeroyHC
Face identification by deformation measure (BL, IH, LDC), pp. 633–637.
ICPRICPR-1996-LuoWN #documentation
Identifying contents page of documents (QL, TW, TN), pp. 696–700.
ICPRICPR-1996-ShimotsujiA
Form identification based on cell structure (SS, MA), pp. 793–797.
ICPRICPR-1996-SoiferKKS #using
Fingerprint identification using the directions field (VAS, VVK, SNK, RVS), pp. 586–590.
KDDKDD-1996-GaneshSR #database #integration #mining
Mining Entity-Identification Rules for Database Integration (MG, JS, TR), pp. 291–294.
SEKESEKE-1996-Hurley #requirements #specification
Identifying Language Requirements for Specifying Industrial-Strength Software Agents (WDH), pp. 238–245.
OOPSLAOOPSLA-1996-EcklundDF #case study #requirements
Change Cases: Use Cases that Identify Future Requirements (EFEJ, LMLD, MJF), pp. 342–358.
REICRE-1996-BoehmI
Identifying Quality-Requirement Conflicts (BWB, HI), p. 218.
ICSEICSE-1996-Kaindl #domain model #how #modelling
How to Identify Binary Relations for Domain Models (HK), pp. 28–36.
SACSAC-1996-HashemiSHL #testing #using
Identifying and testing of signatures for non-volatile biomolecules using tandem mass spectra (RRH, TMS, WGH, JOL), pp. 44–49.
SACSAC-1996-SucciBR #component #nondeterminism #specification #taxonomy
A taxonomy for identifying a software component for uncertain and partial specifications (GS, FB, MR), pp. 570–579.
DACDAC-1996-IyerLA
Identifying Sequential Redundancies Without Search (MAI, DEL, MA), pp. 457–462.
ICDARICDAR-v1-1995-Chen #image
Computer processing on the identification of a Chinese seal image (YSC), pp. 422–425.
ICDARICDAR-v1-1995-HanS
Signature identification via local association of features (KH, IKS), pp. 187–190.
ICDARICDAR-v1-1995-HochbergKKT #automation #clustering #image #using
Automatic script identification from images using cluster-based templates (JH, LK, PK, TT), pp. 378–381.
ICDARICDAR-v1-1995-LiuDL
Extracting individual features from moments for Chinese writer identification (CLL, RWD, YJL), pp. 438–441.
ICSMEICSM-1995-CimitileLM #case study #reuse #slicing #specification #using
Identifying reusable functions using specification driven program slicing: a case study (AC, ADL, MM), pp. 124–133.
SEKESEKE-1995-LanubileLV #component #modelling
Comparing models for identifying fault-prone software components (FL, AL, GV), pp. 312–319.
DACDAC-1995-SparmannLCR #fault #performance #robust
Fast Identification of Robust Dependent Path Delay Faults (US, DL, KTC, SMR), pp. 119–125.
ICSMEICSM-1994-CanforaCTM #data type #precise #reuse
A Precise Method for Identifying Reusable Abstract Data Types in Code (GC, AC, MT, MM), pp. 404–413.
ICSMEICSM-1994-KungGHWTC #impact analysis #maintenance #object-oriented
Change Impact Identification in Object Oriented Software Maintenance (DCK, JG, PH, FW, YT, CC), pp. 202–211.
CIKMCIKM-1994-LeeW #image #retrieval
Computer Image Retrieval by Features: Selecting the Best Facial Features for Suspect Identification Systems (ESL, TW), pp. 105–111.
PEPMPEPM-1994-DeanCG #object-oriented
Identifying Profitable Specialization in Object-Oriented Languages (JD, CC, DG), pp. 85–96.
DATEEDAC-1994-ChenYF #debugging #design #model checking
Bug Identification of a Real Chip Design by Symbolic Model Checking (BC, MY, MF), pp. 132–136.
DATEEDAC-1994-WittmannH #optimisation #performance #testing
Efficient Path Identification for Delay Testing — Time and Space Optimization (HCW, MH), pp. 513–517.
ISSTAISSTA-1994-RothermelH #requirements #test coverage #testing
Selecting Tests and Identifying Test Coverage Requirements for Modified Software (GR, MJH), pp. 169–184.
ICDARICDAR-1993-GazzoloB #realtime #recognition
Real time signature recognition: A method for personal identification (GG, LB), pp. 707–709.
ICDARICDAR-1993-KimSK #diagrams #logic #recognition
Recognition of logic diagrams by identifying loops and rectilinear polylines (SHK, JWS, JHK), pp. 349–352.
ICDARICDAR-1993-Nagaishi #induction #recognition
Identifying ability of a recognition method based on the field of induction (MN), pp. 926–929.
ICDARICDAR-1993-YangHT #approximate #automation #using
Automatic seal identification using fluency function approximation and relaxation matching method (YY, TH, KT), pp. 786–789.
WCREWCRE-1993-CanforaCM #data type #reuse #reverse engineering
A Reverse Engineering Method for Identifying Reusable Abstract Data Types (GC, AC, MM), pp. 73–82.
WCREWCRE-1993-CutilloFV #component #independence #scalability #source code
Identification and Extraction of “Domain Independent” Components in Large Programs (FC, PF, GV), pp. 83–92.
CHIINTERCHI-1993-LeeW #image #retrieval
Computer image retrieval by features: suspect identification (ESL, TW), pp. 494–499.
SIGIRSIGIR-1993-PaiceJ #concept
The Identification of Important Concepts in Highly Structured Technical Papers (CDP, PAJ), pp. 69–78.
DACDAC-1993-BamjiV #constraints #named
MSTC: A Method for Identifying Overconstraints during Hierarchical Compaction (CB, RV), pp. 389–394.
DACDAC-1993-JoneF #optimisation
Timing Optimization By Gate Resizing And Critical Path Identification (WBJ, CLF), pp. 135–140.
DACDAC-1993-OhlrichEGS #algorithm #morphism #named #performance #using
SubGemini: Identifying SubCircuits using a Fast Subgraph Isomorphism Algorithm (MO, CE, EG, LS), pp. 31–37.
CSCWCSCW-1992-KuuttiA #concept #process
Identifying Potential CSCW Applications by Means of Activity Theory Concepts: A Case Example (KK, TA), pp. 233–240.
AdaTRI-Ada-C-1992-Strong #development #lifecycle #object-oriented #scalability
Identifying a Complete Object Oriented Life Cycle for Large Systems Development (NSS), pp. 166–175.
CCCC-1992-Poetzsch-Heffter #implementation #specification
Implementing High-Level Identification Specifications (APH), pp. 59–65.
HTHT-1991-BotafogoS #hypermedia
Identifying Aggregates in Hypertext Structures (RAB, BS), pp. 63–74.
ICMLML-1991-YooF #bound #effectiveness
Identifying Cost Effective Boundaries of Operationality (JPY, DHF), pp. 569–573.
DACDAC-1991-JuS #incremental
Incremental Techniques for the Identification of Statically Sensitizable Critical Paths (YCJ, RAS), pp. 541–546.
PLDIPLDI-1990-Horwitz #difference #semantics
Identifying the Semantic and Textual Differences Between Two Versions of a Program (SH), pp. 234–245.
DACDAC-1990-Chakravarty #on the
On Synthesizing and Identifying Stuck-Open Testable CMOS Combinational Circuits (SC), pp. 736–739.
ICMLML-1989-LeviSP #behaviour #knowledge base
Identifying Knowledge Base Deficiencies by Observing User Behavior (KRL, VLS, DLP), pp. 296–301.
SEKESEKE-1989-WuCZT #morphism #novel #query #subclass
A Novel Way 1o Identify IneguaIity Query Subclasses Which possess the Homomorphism Property (TW, JLC, NZ, KT), pp. 158–163.
HCIHCI-CE-1987-Springer #pretty-printing #retrieval
Retrieval of Information from Complex Alphanumeric Displays: Screen Formatting Variables’ Effects on Target Identification Time (CJS), pp. 375–382.
DACDAC-1986-ShinshaKSKI #incremental #logic #synthesis
Incremental logic synthesis through gate logic structure identification (TS, TK, YS, JK, KI), pp. 391–397.
ICALPICALP-1982-CaseL #induction
Machine Inductive Inference and Language Identification (JC, CL), pp. 107–115.
DACDAC-1981-Masurkar #algorithm #development #fault #network
An algorithmic pretest development for fault identification in analog networks (VM), pp. 204–212.
SIGIRSIGIR-1980-Paice #approach #automation #generative #self
The Automatic Generation of Literature Abstracts: An Approach Based on the Identification of Self-Indicating Phrases (CDP), pp. 172–191.
STOCSTOC-1972-KarpMR #agile #array #string
Rapid Identification of Repeated Patterns in Strings, Trees and Arrays (RMK, REM, ALR), pp. 125–136.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.